CYBERSECURITY - A WORLD OF EXPERTS AND CRIMINALS Flashcards
This group of criminals breaks into computers or networks to gain access for various
reasons
Hackers
attackers break into networks or computer systems to discover weaknesses in order to
improve the security of these systems.
White hat
attackers are somewhere between white and black hat attackers. The gray hat attackers may
find a vulnerability and report it to the owners of the system if that action coincides with their agenda.
Gray hat
attackers are unethical criminals who violate computer and network security for personal gain,
or for malicious reasons, such as attacking networks.
Black Hat
- Teenagers or hobbyists mostly limited to pranks and vandalism, have little or
no skill, often using existing tools or instructions found on the Internet to launch attacks.
Script Kiddies
Grey hat hackers who attempt to discover exploits and report
them to vendors, sometimes for prizes or rewards.
Vulnerability Brokers
Grey hat hackers who rally and protest against different political and social
ideas. Hacktivists publicly protest against organizations or governments by posting articles,
videos, leaking sensitive information, and performing distributed denial of service (DDoS)
attacks.
Hacktivists
These are black hat hackers who are either self-employed or
working for large cybercrime organizations.
Cyber Criminals
Depending on a person’s perspective, these are either
white hat or black hat hackers who steal government secrets, gather intelligence, and
sabotage networks. Their targets are foreign governments, terrorist groups, and
corporations
State Sponsored Hackers
is a weakness that makes a target susceptible to an attack
Cyber vulnerability
recognize the threat that data poses if used against people
Cybersecurity specialists
is the possibility that a harmful event, such as an attack, will occur
cybersecurity threat
are particularly dangerous to certain industries and the type of
information they collect and protect
Cyber threats
possess the insight to recognize the influence of data and
harness that power to build great organizations, provide services and protect people
from cyberattacks
- Cybersecurity specialists
are an example of Information Security
Management Standards. The standards provide a framework for implementing
cybersecurity measures within an organization.
ISO 27000 standards