Chapter 1 Flashcards
Three levels of protection
Personal, Organizational, Government
ISP
Internet Service Provider
IoT
Internet of Things
CIA Triad
Confidentiality, Integrity, Availability
White hat attackers
break into networks or computer systems to identify any weaknesses so that the security of a system or network can be improved. These break-ins are done with prior permission and any results are reported back to the owner.
Gray hat attackers
may set out to find vulnerabilities in a system but they will only report their findings to the owners of a system if doing so coincides with their agenda. Or they might even publish details about the vulnerability on the internet so that other attackers can exploit it.
Black hat attackers
take advantage of any vulnerability for illegal personal, financial or political gain.
Hacktivists
make political statements to create awareness about issues that are important to them.
State-sponsored attackers
gather intelligence or commit sabotage on behalf of their government. They are usually highly trained and well-funded and their attacks are focused on specific goals that are beneficial to their government.
Stuxnet
Sign of the Times
An individual user profile on a social network site is an example of an _____ identity.
online
Cyberwarfare
is the use of technology to penetrate and attack another nation’s computer systems and networks in an effort to cause damage or disrupt services, such as shutting down a power grid.
Spyware
Designed to track and spy on you, spyware monitors your online activity and can log every key you press on your keyboard, as well as capture almost any of your data, including sensitive personal information such as your online banking details. Spyware does this by modifying the security settings on your devices.
It often bundles itself with legitimate software or Trojan horses.
Adware
Adware is often installed with some versions of software and is designed to automatically deliver advertisements to a user, most often on a web browser. You know it when you see it! It’s hard to ignore when you’re faced with constant pop-up ads on your screen.
It is common for adware to come with spyware.
Backdoor
This type of malware is used to gain unauthorized access by bypassing the normal authentication procedures to access a system. As a result, hackers can gain remote access to resources within an application and issue remote system commands.
A backdoor works in the background and is difficult to detect.