Hacking!!!- Lesson 3 Flashcards
is the gaining of access to a computer and viewing, copying, or creating data without the intention of destroying data or maliciously harming the computer.
Hacking
broad term used to describe many complex activities wherein the end goal is typically to obtain access to a computer system’s servers
Hacking
ains authorized/unauthorized access to a computer WITHOUT the intention of causing damage.
Hacker
is someone who seeks and exploits weaknesses in a computer system or computer network.
Hacker
Reasons of hackers:
Why do hackers hack?
Just for ____ ?
Just for fun
Reasons of hackers:
Why do hackers hack?
set up alert or to ____
Notify
Reasons of hackers:
Why do hackers hack?
To ____ off
to Show off
Reasons of hackers:
Why do hackers hack?
Hack other systems ____
Hack other systems secretly
Reasons of hackers:
Why do hackers hack?
____ many people’s thought or important information.
Steal many people’s thought or important information.
Reasons of hackers:
Why do hackers hack?
____ enemy’s computer network during war.
Destroy enemy’s computer network during war
Reasons of hackers:
are criminals who break into computer networks with malicious intent.
Black Hat Hacker
Black hat hackers often start as novice or ____
script kiddies
uses their capabilities to uncover security failings to help safeguard organizations from dangerous hackers
White Hat Hacker
White hat hackers – sometimes also called ____ or ____
“ethical hackers” or “good hackers”
White hat hacker skills includes, EXCEPT what?
* Social Engineering
* Penetration Testing
* Reconnaissance and research
* Break into networks with malicious intent
* Programming
* Using variety of digital and physical tools
Break into networks with malicious intent
Somewhere between. Sometimes violate laws or usual ethical standards, but they do not have the malicious intent typical of a black hat hacker.
Gray Hat Hacker
means taking control from the website owner to a person who hacks the website.
Website Hacking
generally means gathering information about domain by using tools like Telnet, Ns look Up and Ping.
Network Hacking
is where a person hacks to find weaknesses in a system and then usually patches them.
Ethical Hacking
is illicit access to an email account or email correspondence.
Email Hacking
the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.
Password Hacking
Unauthorized accessing bank accounts without knowing the password or without permission of account holder is known as ____.
Online banking hacking
is when files on your computer are viewed, created, or edited without your authorization.
Computer/ Phone/ Device Hacking