[ADAPTED] IB Computer Science Case Study 2026: An ethical approach to hacking

0.0(0)
studied byStudied by 0 people
0.0(0)
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/66

flashcard set

Earn XP

Description and Tags

Key terminology

Last updated 11:23 AM on 2/5/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

67 Terms

1
New cards

Cross site scripting (xss)

A web application vulnerability. Attackers inject malicious html or java code into a websites code that is executed upon user visit.

2
New cards

Exploit development

Specialized area in cybersecurity focused on discovering and using software vulnerabilities. It involves analyzing software to find weak spots and then crafting code to take advantage of them to gain unauthorized access, escalate privileges, or achieve other obejctives

3
New cards

Password cracking tool

A tool used in attempts to discover passwords, often by trying many possibilities.

4
New cards

Penetration testing

Simulated cyberattack used to evaluate the security of a system or network. It involves ethical hackers that attempt to exploit vulnerabilities to identify weaknesses to improve security measures

5
New cards

Port scanning

Network security technique used to identify open ports on a network, revealing vulnerabilities and services running on the system

6
New cards

Pretexting

A form of social engineering attack where someone fabricates a story to obtain privileged data. Used to gain victim trust and trick them into sharing sensitive information, performing actions, or garanting access to systems

7
New cards

Response plan

A plan that outlines specific actions to be taken in an event, ensures a coordinated and effective reaction. Effective plans are clear, actionable and up to date. Includes incident detection, response strategies, and recovery processes

8
New cards

Search engine dorking

A technique that uses advanced search operators to find specific, hidden or sensitive information on the web. It allows users to target precise information

9
New cards

Security posture assessment

A holistic evaluation of an organization's cybersecurity strength, focusing on identifying vulnerabilities and overall resilience against cyber threats. It helps the understanding of the current security status and prioritize areas for improvement

10
New cards

Hacker

An individual who attempts to gain unauthorized access to a computer system.

11
New cards

Social Engineering Attacks

Tactics used to manipulate individuals into revealing confidential information or performing actions that compromise security.

12
New cards

IP Address

A unique numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication.

13
New cards

Network topology

The arrangement of the various elements: links, nodes, in a network.

14
New cards

OS detection

The process of determining the operating system running on a networked device.

15
New cards

SQL Injection

A technique used to attack data-driven applications by inserting malicious SQL statements into an entry field for execution.

16
New cards

Define White Box Testing

A testing approach that involves an in-depth analysis with full knowledge of the IT infrastructure

17
New cards

Gray Box Testing

Only limited information is shared with the tester. Usually, this takes the form of login credentials. It is useful to help understand the level of access a privileged user could gain and the potential damage they could cause. Balance between depth and efficiency, can be used to simulate either an insider threat or an attack that has breached the network perimeter

18
New cards

Black Box Testing

No information is provided to the tester at all. Most authentic scenario, demonstrating how an individual with no inside knowledge would target and compromise an organisation. Typically the costliest option

19
New cards

OSINT

Data collected from publicly available sources, such as social media and official records that can then be analyzed

20
New cards

Malware

Software designed to disrupt, damage, or gain unauthorised access to a computer system.

21
New cards

Vishing (Voice Phishing)

Fraudulent method of making voice calls or leaving voice messages imitating reputable companies or individuals to obtain sensitive information.

22
New cards

Active-active healthcare data centre

A configuration where two or more data centres are running the same services and applications simultaneously and are synchronised with each other. If one data centre fails or experiences a disruption, the other one can take over seamlessly, with no data loss or downtime.

23
New cards

Network Mapping

The use of tools to discover and document physical and logical connectivity that exists in the network such as network topologies, including servers, firewalls, and other devices.

24
New cards

Network scanning

The use of tools to detect all active hosts on a network and mapping them to their IP addresses, as well as running services and open ports.

25
New cards

CVEs

A list of publicly known cybersecurity vulnerabilities in systems used to address issues and track patch progress.

26
New cards

Return-Oriented Programming (ROP)

A sophisticated technique that uses existing code snippets that are also known as gadgets in memory, chaining them together to bypass certain protection mechanisms and execute arbitrary code.

27
New cards

Network/packet sniffing

A computer program or computer hardware such as a packet capture appliance that can analyze and log traffic that passes over a computer network or part of a network.

28
New cards

Fuzzers

These automatically input a vast amount of random, unexpected, or malformed data into software applications to discover coding errors and vulnerabilities.

29
New cards

PACS

Medical imaging technology which provides economical storage and convenient access to images from multiple modalities/source machine types. Could be compared to an archiving and communication system.

30
New cards

Io T-Enabled medical devices

Devices with unique and critical vulnerabilities that usually can't easily be patched. The use hard-coded passwords and failure can have immediate life or death consequences such as involving infusion pumps or heart monitors.

31
New cards

NMap

A free and open source utility for network discovery that uses raw IP packets to determine characteristics of a network, such as what hosts are available on the network, the services (including the application name and version) and what those hosts are offering. Also determines what operating systems and OS versions they are running and what type of packet filters/firewalls are used.

32
New cards

MetaSploit

A framework designed for developing exploits and executing them in a systematic manner. They can significantly reduce the time needed for writing custom exploits.

33
New cards

Lateral Movement

The technique attacers use to move from a compromised system to others within the network. A key part of Post-Exploitation.

34
New cards

Priviledge Escalation

Ways that hackers use to exploit access to conpromised machines through Vertical priviledge escalation (gaining higher priviledges on the same machine) and Horizontal (gaining access to another user's priviledges at the same level).

35
New cards

Persistence Mechanisms

How attackers maintain access, such as scheduled tasks, new user accounts and Dynamic Loaded Library hacking.

36
New cards

Security Information and Event Management (SIEM)

An application that aggregates and analyzes log data to monitor critical activities in an organization.

37
New cards

Zero-Day Vulnerability

A software vulnerability that is unknown to the developers that can be exploited by attackers.

38
New cards

Cialdini's 6 principles of persuasion

1. friendship/liking
2. commitment/consistency
3. scarcity
4. reciprocity
5. social validation
6. authority

Ways to explain how specific social engineering attacks can work.

39
New cards

Internet of Medical Things

The specific subset of IoT for healthcare.

40
New cards

Clinical Engineering vs IT Departments

Highlights the organizational silos in hospitals that create security gaps for medical devices.

41
New cards

Protected Health Information (PHI)

The specific term for the sensitive data in EHRs that HIPAA protects.

42
New cards

STRIDE Model

Spoofing
Tampering
Repudiation
Information Disclosure
Denial of Service
Elevation of Privilege

threat modelling framework

43
New cards

CVSS

Common Vulnerability Scoring System, used to determine the severity of a vulnerability to aid in prioritisation.

44
New cards

DREAD Model

Damage Potential
Reproducibility
Exploitability
Affected Users
Discoverability

The vulnerability severity model

45
New cards

BC&DR

Business Continuity and Disaster Recovery, Broader plans that a cybersecurity incident response plan feeds into.

46
New cards

HIPAA (Healh Insurance Portability and Accountability Act)

The primary US regulation for health and data privacy and security. The legal context for everything in the case study.

47
New cards

Responsible Disclosure

The process of privately reporting a vulnerability to the vendor before making it public. The ethical hacking counterpart to finding bugs.

48
New cards

Get Out Of Jail Free Card

Document used by pen testers to protect themselves in case approached by security during testing. This is a slang term for agreement made in pre engagement phase to define the rules of engagement.

49
New cards

Non-Disclosure Agreement (NDA)

A legal document that binds the testers to confidentiality thats crucial to protecting Personal Health Information (PHI) and details of any vulnerabilities.

50
New cards

Burp Suite / OWASP ZAP

Tools for web application testing (highly relevant for EHR systems and login portals).

51
New cards

Nessus / OpenVAS

Industry standard vulnerability scanners.

52
New cards

Buffer overflow attacks

A technique used to exploit vulnerabilities by overwriting a buffer's boundary and writing into adjacent memory.

53
New cards

Exploit development

The process of creating custom scripts or tools designed to take advantage of specific vulnerabilities in a system.

54
New cards

Pre-engagement interactions

The first phase of PTES, involving preparation, securing approvals, and assembling tools.

55
New cards

Intelligence gathering

The second phase of PTES, where data is collected from external sources like social media and public records.

56
New cards

Threat modelling

The third phase of PTES, where potential threats and vulnerabilities are identified and mitigation strategies are developed.

57
New cards

Vulnerability analysis

The fourth phase of PTES, where vulnerabilities that could be exploited are identified and confirmed.

58
New cards

Exploitation

The fifth phase of PTES, where an attempt is made to breach the system using identified vulnerabilities.

59
New cards

Post-exploitation

The sixth phase of PTES, focusing on maintaining control of a compromised system and extracting data.

60
New cards

Reporting

The final phase of PTES, which involves documenting the entire testing process and presenting the findings to the client.

61
New cards

Internet of Things (IoT)

A network of physical objects that are embedded with other technologies for the purpose of connecting and exchanging data with other devices and systems over the internet.

62
New cards

Electronic Health Records (EHRs)

Digital versions of a patient's paper charts, containing their medical and treatment histories.

63
New cards

System forensics


The analysis of traces left by an exploitation process, such as examining system logs or detecting malware.

64
New cards

SQL injection

A technique used to attack data-driven applications by inserting malicious SQL statements into an entry field for execution.

65
New cards

Search engine dorking

An advanced search technique that uses specific search strings to find sensitive files or login portals that are not intended to be public.

66
New cards

What does White box testing involve?

This involves sharing full network and system information with the tester, including network maps and credentials.

67
New cards

State the advantages and uses of White box testing

This helps to save time and reduce the overall cost of an engagement. A white box penetration test is useful for simulating a targeted attack on a specific system utilising as many attack vectors as possible.