1/20
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
hackers
digital safecrackers
hackers
their motivation is often malicious, but
some actually work for the greater good.
white hat hackers
Engage in legal hacking (ethical hacking) to improve digital
security for those who contract them
black hat hackers
Are cybercriminals who orchestrate scams and exploit vulnerabilities with the intent to cause harm.
The aim is usually to make money.
They are the most dangerous hackers
gray hat hackers
an ambiguous ethical hacking area between white and black.
2. they don't exploit vulnerabilities to cause harm but not for free
red hat hackers
"superheroes"
They typically target black hat hackers t
blue hat hackers
white hat hackers who are employed by an organization
work as part of the team often work for IT department
Script kiddies and green hat hackers
inexperienced hackers
Script kiddies
rely on social engineering, because
they aren't skilled enough
green hat hackers
want to develop the technical
skills to one day become white or blue hat hackers
hacktivist
fight back against perceived political or social injustice
group is Anonymous,
state-sponsored hackers
Work for governments.
Some are white hat hackers who work to improve national cybersecurity, but others use black hat tactics to harm other countries
whistleblower
who works for an organization and decides to expose
wrongdoing from within.
surface web
• Also called the Visible Web, Indexed Web, Indexable Web, or
Lightnet.
• Is that portion of the World Wide Web that is readily available
to the general public and searchable with standard web search
engines (Google or Bing). It is the opposite of the Deep Web.
deep web
Cannot be found or directly accessed via web search engines like Google or Bing, therefore, cannot be accessed it easily.
represents the majority of the network.
Minimal illegal activities a
dark web
cannot be accessed by a search engine (or indeed, a user) without an appropriately permissioned account.
Large-scale illegal activity
TOR
free software for enabling anonymous communication
"The Onion Router"
encryption, nested like the layers of an onion, used to anonymize communication.
RA 8484 or the "Access Device Regulation Act of 1998."
Before the year 2000, there was only one law that prevents a cybercrime from happening.
t can be used to obtain money, good,
services or any other thing of value o
"I LOVE YOU”
Created by Onel De Guzman
Republic Act RA 8792, otherwise known as
the "Electronic Commerce Act of 2000.”
admissibility of electronic data messages, documents and signatures
he Philippines as a legitimate player in the
global marketplace. It has placed the Philippines among the countries penalizing cybercrime.
RA 10175 also known as CYBERCRIME PREVENTION ACT OF 2011”
in 2012 they passed a new law which
strengthens the already existing laws in order to penalize more
acts that can be considered as a form of cybercrime t