#32 Flashcards
Hackers who hunt for bugs and try to close security holes in software to make systems safer and more resilient. They are often hired by companies and governments to perform security evaluations
White Hats
Malicious hackers with intentions to steal, exploit and sell computer vulnerabilities and data
Black Hats
Some hack for amusement and curiosity while cybercriminals hack most often for what?
Monetary gain
Who use their skills to promote a social or political goal?
Hacktivists
The most common way that hackers get into computer systems is not by hacking its by tricking users to let them in. This is called what? This is where a person is manipulated into divulging confidential information or configuring a computer system so that it permits entry by attackers.
Social Engineering
The most common type of attack.
Phishing
You encounter most often as an email asking you to login to an account on a website. This is an example of what?
Phishing
Where attackers call up a company and then confidential pretend to be from their IT department. This is an example of what?
Pre-texting
Emails ar a sommen delivery mechanism for what?
Trojan horses
What are programs that masquerade as harmless attachments, like a photo or invoice, but actually contain malicious software, called malware ?
Trojan horses
Demand a ransom
Ransomeware
If you have physical access to a computer you can attach wires to the device’s memory chip and make a perfect copy of its contents. With this set up you can try a series of passwords, until the device stats making you wait.
NAND Mirroring
Successfully utilizing a bug to gain capabilities or access
Exploit
Buffer Overflow is an example of what?
Exploit
Buffers are a general term for a block of memory reserved for storing data.
True