CSCI369 - Ethical Hacking Lecture 1 Flashcards

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/21

flashcard set

Earn XP

Description and Tags

Flashcards based on the Introduction to Ethical Hacking lecture.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

22 Terms

1
New cards

What is the purpose of a penetration tester?

To conduct a penetration test.

2
New cards

What is a Black Hat Hacker?

Hackers operating on the wrong side of the law; they may or may not have an agenda

3
New cards

What are Cyberterrorists known for?

A new form of hackers trying to destroy targets and cause bodily harm. Sometimes their actions are not stealthy.

4
New cards

Who created the Internet Worm in 1988?

Robert T. Morris

5
New cards

Which hacking group targeted famous individuals like Donald Trump?

Anonymous

6
New cards

What is the definition of Cyberlaw?

Cyberlaw can touch on many elements including contracts, interactions between suppliers and consumers, policies for handling of data and accessing corporate systems, complying with government regulations and programs etc.

7
New cards

What US code section relates to fraud and electronic mail?

18 U.S.C. $1037

8
New cards

What UAE law was issued in 2012 regarding cybercrime?

The UAE Cybercrime Law No 5 of 2012, issued by President His Highness Shaikh Khalifa Bin Zayed Al Nahyan

9
New cards

What is identity theft?

Stealing of the information that allow a person to impersonate other person(s) for illegal purposes, mainly financial gains such as opening credit card/bank account, obtaining rental properties and etc.

10
New cards

What is Network intrusion?

Most common type of attack; it leads to other cybercrimes Example: Breaking into your neighbour’s WiFi network will open a lot of opportunities of attack.

11
New cards

What is Embezzlement?

A form of financial fraud involving theft and/or redirection of funds

12
New cards

What is the aim of the Penetration Testing Methodology?

To enhance opportunities and reduce threats in an organization

13
New cards

What are the three typical types of testing?

Black-Box Testing, Grey-Box Testing, White-Box Testing

14
New cards

What is External Testing?

Execute the test from a remote location much like a real attacker; the pentester will be extremely limited on information of the target

15
New cards

What is Internal Testing?

This test simulates an “insider attack”

16
New cards

What should a contract include for penetration testing?

Systems to be evaluated, Perceived risks,Timeframe, Actions to be performed when a serious problem is found, Deliverables

17
New cards

What is the CIA Triad?

Confidentiality, Integrity, Availability

18
New cards

What is the goal of confidentiality in the CIA triad?

Keep information secret/private from those who are not authorized

19
New cards

What is the goal of integrity in the CIA triad?

Keep information in a format that retains its original purpose and meaning

20
New cards

What is the goal of availability in the CIA triad?

Keep information and resources available to those legitimate users

21
New cards

What is a Certified Ethical Hacker (CEH)?

An ethical hacker that has mastered the hacking technologies

22
New cards

What is one of the most popular SANS Institute documents?

Top 20 list