cpe 046 p3 Flashcards
is the practice of protecting systems,
networks, and programs from digital attacks.
Cybersecurity
is the term used for a broad range of malicious
activities accomplished through human interactions.
Social engineering
attacks are a bundle of false
promises to exasperate a sufferer’s cupidity or curiosity.
Baiting
involves victims being bombarded with false alarms and
fictitious threats.
Scareware
The scam is often initiated by a perpetrator
pretending to need sensitive information from a victim so as to
perform a critical task.
Pretexting
This is a more targeted version of the phishing scam
whereby an attacker chooses specific individuals or enterprises.
Spear phishing
the attackers promise a
reward in exchange for information.
Quid Pro Quo (Something for Something)
In this, attackers usually target the
person who likes to get involved romantically or sexually
with someone online.
Honey Traps
may refer to anyone with technical skills,
however, it typically refers to an individual who uses his or her skills
to achieve unauthorized access to systems or networks so as to
commit crimes.
Hackers
Types of Hackers
- White Hat –
- Gray Hat -
- Black Hat -
- Green Hat -
- Blue Hat -
- Red Hat -
Types of Organized Hackers
- Hacktivists
- Terrorists
- State-backed hackers
- Internet stalkers
- Disgruntled Employees
the unlawful use of violence and intimidation,
especially against civilians, in the pursuit of political aims.
Terrorists
tend to be more interested in embarrassing
companies or publicizing damning evidence of some sort and
are usually not interested in robbing their targets of money or
assets.
Hacktivists
are carried out by cyber criminals
directly linked to a nation-state to exploit infrastructure
vulnerabilities.
State-backed hackers
is conducted through the use of social networking
platforms and malware, that are able to track an individual’s PC
activity with little or no detection.
Internet stalkers
Disgruntled employees become
hackers with a particular motive and also commit cyber crimes.
Disgruntled Employees
a kind of information gathering on
network system and services. This enables the attacker to
discover vulnerabilities or weaknesses on the network.
Reconnaissance
ICMP
Internet Control Message Protocol
a common technique used to discover open doors or weak
points in a network.
Port Scans
technique whereby packet data flowing across the network
is detected and observed.
Packet Sniffing