Cybersecurity Essentials Flashcards
In the context of cybersecurity, what term describes an area that needs protection, possibly bounded by logical or physical limits, and is subject to control and authority within a specific system?
Domain
What term is exemplified by Google, Facebook, and LinkedIn in the context of the Internet, where each represents a controlled area for data collection, user interaction, and providing services, utilizing user-contributed information like personal data, interests, and professional connections?
Domain
In the context of cybersecurity, who are individuals with limited skills, often using pre-made tools or online instructions to conduct attacks, ranging from mere curiosity to attempts at causing harm, and can still cause significant damage despite their basic approach?
Amateurs
What term describes individuals who infiltrate computers or networks with varying intentions, classified as white, gray, or black hats based on their methods and motives, ranging from identifying and improving system security to exploiting vulnerabilities for illegal gains?
Hackers
Who are the ethical cyber specialists that use their programming knowledge for legal and ethical purposes, conducting penetration tests to identify and report security vulnerabilities, and may receive rewards or bounties for their findings?
White hat hackers
What term is used for individuals who may operate without ethical approval, compromise systems without permission, and potentially reveal vulnerabilities either publicly or to the organization affected, not necessarily for personal gain but often in ethically ambiguous situations?
Gray hat hackers
What is the designation for cybercriminals who intentionally breach computer and network security for personal benefit or to inflict harm, exploiting vulnerabilities to compromise systems?
Black hat hackers
What term encompasses the range of groups that operate in the cyber realm including professional criminal organizations, hacktivists, terrorists, and government-funded entities, all of whom may engage in sophisticated and targeted cyber operations for various motives like profit, political activism, espionage, or sabotage?
Organized hackers
What term refers to cyber activists who engage in hacking to make political statements, often by exposing sensitive information to raise awareness about various issues, and differs from state-sponsored attackers who conduct cyber espionage or sabotage for national interests?
Hacktivists
What type of hacker would work with ATM manufacturers to resolve security vulnerabilities after hacking into ATM machines using a laptop?
Grey Hat
What type of hacker would transfer $10 million to their bank account using victims’ account numbers and PINs recorded without their knowledge?
Black Hat
What type of hacker is tasked with identifying weaknesses within their company’s computer system?
White Hat
What type of hacker uses malware to compromise corporate systems and sell stolen credit card information to the highest bidder?
Black Hat
What type of hacker stumbles across a security vulnerability on a corporate network they are authorized to access while researching for exploits?
White Hat
What type of hacker collaborates with technology companies to fix a DNS flaw?
White Hat
What term, originated in the 1990s, describes young or inexperienced individuals who use pre-written scripts or tools to hack into systems, often without a profit motive but with the potential to cause harm?
Script Kiddies
Who are the individuals, often considered gray hat hackers, that seek out security weaknesses and report their findings to the vendors, sometimes in exchange for compensation or bounties?
Vulnerability Broker
What term is used for gray hat hackers who engage in online activism, protesting against political or social issues by publishing articles, videos, leaking sensitive data, and conducting DDoS attacks?
Hacktivists
What term describes black hat hackers who may operate independently or within organized groups, and are known for committing offenses that result in substantial financial losses for individuals and companies annually?
Cyber Criminals
What classification is given to hackers, viewed as white or black hat depending on perspective, that are supported by a nation’s government to infiltrate foreign entities to exfiltrate secrets, gather intelligence, and potentially disrupt networks?
State-Sponsored
Identifying cybersecurity countermeasure used to thwart cyber criminals:
The Honeynet Project
Early Warning Systems
Identifying cybersecurity countermeasure used to thwart cyber criminals:
The InfraGard Program
Sharing Intelligence
Identifying cybersecurity countermeasure used to thwart cyber criminals:
ISO/IEC 27000
ISM Standards
Identifying cybersecurity countermeasure used to thwart cyber criminals:
Cybersecurity Act
New laws