Intro To Networking Security Flashcards
Advanced persistent threat (APT)
Malware that waits to cause damage
Zero day vulnerabilities
Issues with the code that are not yet known but will need to be routinely fixed with patches as they are discovered
Blue, red, white and purple teams (iterate and improve model)
The blue team defends, the red team attacks, white observes, and then the teams debrief and cross train each other to repeat the process (purple).
White hat hackers
IT professionals with authorization to hack
Black hat hackers
People without authorization that typically hack for profit
Gray hat hackers
Hackers who do not have permission but are not malicious in their attacks
Nation states
Nations states present a unique threat to software as they have significantly more funding than single hackers or even hacking groups. Nation states will use hackers for industrial espionage.
Script kiddies
People who hack for entertainment/ curiosity potentially because they are new to hacking
Wiretapping
Electronic eavesdropping
Port scanning
Checks all TCP ports to determine what services/ applications are running on the victims device
Taking control
Using input boxes in order to type special commands that give outsiders control
Spoofing
Electronic impersonation
Denial of service
Attacks that make things unavailable for those who need them
Social engineering
Utilizing social interaction in order to gain unauthorized access or information
Honey pot
A server/ device that looks authentic and distracts would be hackers from the actual information