Discussion Vsr Flashcards

1
Q

is a significant motive for hackers, malware writers, and freudsters

A

Financial incentive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ALSO KNOWN AS SKIDIOTS, SKIDDIES OR VICTOR SKILL DEFICIENCY (VSD)

A

-SCRIPT KIDDIES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

is a Remote Administration Tool (RAT) that allows hackers to gain unauthorized remote access and control over a compromised computer system, operating covertly without the owner’s awareness. It enables attackers to execute commands, exfiltrato data, manipulate system settings, and deploy additional malware while maintaining persistent access.

A

Deep Throat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

consist of individuals using the Internet to communicate and facilitate cybercrime

A

Cybercriminal organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

-Sophisticated computer criminals categorized as hackers or crackers based on motivation

A

CYBERPUNKS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • exploit system vulnerabilities without economic motivation
A

Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

employ knowledge for personal gain

A

-Crackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

-Term “crackers” derived from combination of ____

A

criminal hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

distinguished by economic motivation (Britz, 2013)

A

-Hackers and crackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

target valuable data like trade secrets or credit card Information

A

Hackers or crackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

possess skills akin to black-hats but choose lawful paths

A

White-hats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Often collaborate with authorities and companies to combat cybercrime
A

White-hats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Historically, they refrain from illegal attacks on information systems (Bernik, 2014)
A

White-hats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

engage in illegal acts to harm information systems and steal information

  • Their main purpose is to commit malicious activities (Benik, 2014)
A

Black hats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

hackers fall between black and white-hat hackers

  • Ethics may shift depending on the situation (Bernik, 2014)
A

Gray-hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

accounted for the majority of compromised records in 2011

A

Hacktivists

17
Q

coined by the Cult of the Dead Cow hacker collective in the 19905

A

“hacktivism”

18
Q

-Used to describe technological social movements in contemporary language

-Sourced from Verizon’s 2012 Deta Breach investigations Report (Britz, 2013)

A

Hacktivists

19
Q

An attacker may commit a criminal offense against a company after a perceived injustice against themselves.

20
Q

commonly motivates criminals, both internal and external to the company.

21
Q

It entices them to enrich their lives at others’ expense, disregarding the damage caused

22
Q

is not listed as one of the seven deadly sins by accident

23
Q

-Investigators may swiftly uncover this motivator, prioritizing locating proceeds of the crime to mitigate potential damage

24
Q

rely heavily on technology and education provided by experienced cybercriminals (Graeme, 2020)

A

Script kiddies

25
Q

Some cyber criminals use technical attacks as training exercises to develop skills for more lucrative. attacks

-These attacks also advertise their skill set and successful compromises to build credibility on cybercriminal websites

A

TEST OF SKILL

26
Q

In the fiercely competitive business world, companies seek to gain an edge over rivals

Illegally obtaining competitors intellectaal property via hacking provides an unfair advantage

A

BUSINESS COMPETITOR

27
Q

prioritize personal financial gain over personal vendettas

Attacks on companies serve as business endeavors to make money rather than settle scores

Contractors offer services purely for financial reasons, without personal animosity towards targets

  • They can be found online, including on the dark web, offering services like hacking to the highest bidder
A

Professional criminals

28
Q

Part of the intemet that is not indexed by search engines.

Requires login, permissions, or direct access.

Examples:

Email accounts Gmail, Outlooki

Online banking & financial services (B00, PayPal)

University portals & research databases

Private social media content

Cloud storage (Google Drive, Dropboxi

29
Q

• A small portion of the Deep Web that is intentionally hidden and requires special software to access.

Used for anonymous activities, both legal & illegal.

Not accessible via regular browsers (Google Chrome, Firefox, etc.). Requires Tor Browser or similar tools.

30
Q

-In a connected world, individuals in remote locations can target critical infrastructure

-Goals may be advanced by causing massive security failures in another nation’s infrastructure

Targets include power, nuclear energy, or water delivery systems

-Such attacks could result in large-scale loss of life