chapter 4 Flashcards

1
Q

what is a hacker (textbook)

A

individuals with an interest in computers and technology that access computer systems without legal access to those computer systems

includes: anybody who likes to explore software, and those with malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

phone Phreaks

A

started in the 60s and 70s describes the forerunners of modern computer hacking

blue box - makes free long distance calls by breaking into phone technology

political subversive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

crackers

A

NOW used to describe all malicious hackers (bad)
traditionally someone who could fix early computer systems in the 60s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

programmers of malware

A

small group of people who create malware like computer viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

social engineering

A

confidence game- conman
they trick user into giving up sensitive or private information through some kind of scam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

dumpster diving

A

physical theft of technical info on software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

hackers vs computer criminals

A

computer criminal violates federal law
hackers- makes distinctions, they don’t define the all who hacks as criminal (break the law and not be a criminal)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

scitpt kiddies

A

hackers that use premade malicious software
download existing hacking tools
inexperienced hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

hactivist

A

a person who hacks for a political message
hacking to convert a political message
example anonymous, peta, disturbance theatre

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

penetration testing

A

find weaknesses and hacks software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

distinctions of good and bad hackers

A

penetration testing
exploring networks
adherence to subcultural values

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

white hat hackers

A

a good hacker
Reframed hackers who work as network security specialists often engaged in penetration testing/ reverse engereining

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

black hat hackers

A

bad hacker- malicious hacker on cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

gray hat hackers

A

sometimes hack ethically and sometimes maliciously
invades networks recreationally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

50s-60s

A

hackers are creative problem solvers, fix early problematic programs. positive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

70s

A

advent of phone phreaks
rebels
first hackers subculture begins to emerge

17
Q

80s

A

key decade
new breed of computer user
just teenagers/media
criminalization of hacking
software piracy- stole games, and movies, software is expensive
just exploring the software

18
Q

post internet 90s to present

A

the emergence of organized criminal hacking groups

19
Q

3 views of hacking

A

media
law enforcement
hackers

20
Q

media view on hacking

A

negative view of hacking, focus on the outrageous cases

21
Q

Law Enforcement on hacking

A

hacking is a crime

22
Q

hackers view on hacking

A

they make distinctions between good and bad (white, black and grey hats)
adherence to subcultural values

23
Q

hacker subcultural norms

A

technology
knowledge
commitment
categorization
laws

24
Q

technology

A

deep intense interest
video games
time honing skills

25
Q

knowledge

A

a board knowledge of systems of software coding and networking
there’s a big time mentoring networks

26
Q

commitment

A

time and energy spent doing all of this stuff

27
Q

categorization

A

makes distinctions (white, black and grey hat)

28
Q

laws

A

knowledge on the law in relation to computer networks
a hacker should know what’s legal and not legal
happens at hacker conferences

29
Q

all three videos

A

hacking is a good thing opposed to the way criminal justice seeing hacking.

30
Q

prosocial ways of hacking

A

gummo bought into the hacker subculture…he shows all five subcultural norms