17-1 Flashcards
terrorisms using computers, computer networks, telecommunications or the internet
cyber terrorism
a tool used to execute DDOS
trible flood netowrk
An attempt to acquire information to which a user does not have legitimate access
espionage
Malware that can theoretically manipulate water and power systems
BlackEnergy
A series of advanced cyber attacks that are sustained over a period of time
APT
A term for hacking activities that are motivated by purposes that perpetrator feels are ethically valid
hacktivism
A windows based packet sniffer that has the ability to focus on specific packets
EtherDetect
formerly truecrypt.
open source product
available for Mac, windows, linux
Veracrypt
intorudced with windows 7 in its higher end versions
BirLocker
makes a commercial drive encryption product that is fairly easy to use.
check point software.
several ways that a computer or internet based terorist attack could cause significant harm to a nation
direct economic damage
economic disruption
compromising sensitive military data
disrupting mass communication
A group of several thousand Chinese hackers whose goal is to infiltrate western computer systems. members of the group say that not only do they not have involvement with Chinese govt, but they are also breaking Chinese law and are at constant threat of arrest.
Chinas eagle union