0. Introduction Flashcards
Confidentiality
Keeping systems and data from being accessed, seen, and read to anyone who is not authorized to do so.
Integrity
Protect the data from modification or deletion by unauthorized parties, and ensuring that when authorized people make changes that shouldnt have been made the damage can be undone
Availability
Systems, access channels, and authentication mechanisms must all be working properly for the information they provide and protect to be available when needed.
Non-Repudiation
The assurance that someone cannot deny the validity of something. legal concept that is widely used in information security and refers to a service, which provides proof of the origin of data and the integrity of the data.
Black Hat hacker
Hackers that seek to perform malicious activities
Grey Hat hacker
Hackers that perform good or bad activities but do not have the permission of the organization they are hacking against
White Hat Hacker
Ethical hackers; they use their skills to improve security by exposing vulnerabilities before malicious hackers
Script Kiddie/Skiddies
Unskilled individual who uses malicious scripts or programs, such as a web shell, developed by others to attack computer systems and networks and deface websites
State-Sponsored Hacker
hacker that is hired by a government or entity related
Hacktivist
Someone who hacks for a cause; political reasons
Suicide hackers
These hackers are not afraid of going to jail or facing any sort of punishment, they hack to get the job done.
Cyberterrorist
Motivated by religious or political reasons to create fear or disruption
Hack Value
Perceived value or worth of a target as seen by the attacker
Vulnerability
A system flaw, weakness on the system
Threat
Exploits a vulnerability