1-4 Flashcards
an approach to security that awaits incidents to great to, rather than being proactive
passive security approach
a security approach that is concerned ony with securing the perimeter of a network
perimeter security approach
someone who hacks into phone systems
phreaker
the process of hacking into a phone system
phreaking
a slang term for an unskilled person who purports to be a skilled hacker
script kiddy
someone who is attempting to compromise a system in order to assess its vulnerability. this term is almost never used today; instead, the term penetration tester or ethical hacker is used
sneaker
the use of persuasion on human users in order to gain information required to access a system
social engineering
software that monitors computer use
spyware
dialing phones waiting for a computer to pick up, usually done via some automated system
war dialing
driving and scanning for wireless networks that can be compromised
war driving
a hacker who does not break the law, often synonymous with an ethical hacker
white hat hacker
a hacker whose activities are normally legal but occasionally delves into activities that may not be legal or ethical
gray hat hacker
software that logs key strokes on a computer
key logger