Introduction to Ethical Hacking Flashcards
What is Eavesdropping?
Snooping on the communication between users or devices in order to record private information to launch passive attacks
What is Session Hijacking?
An attack whereby an active session of the user is intercepted and stolen by an attacker
What is Spoofing?
The process of fooling the target device or user by tampering the original message/request and pretending to be trusted origin.
What is Privilege Escalation?
The process of leveraging OS or application’s bug, design flaw or misconfiguration in order to obtain elevated access to resources you otherwise wouldn’t be able to access.
What is Psychological Warfare?
Psychological warfare is the use of various techniques such as propaganda and terror to demoralize one’s adversary in an attempt to succeed in battle
What is Hacker Warfare?
Hacker warfare can vary from the shutdown of systems, data errors, theft of information, theft of services, system monitoring, false messaging, and access to data
What is C2 (Command and Control) Warfare?
C2 warfare refers to the impact an attacker possesses over a compromised system or network that they control
What is Electronic Warfare?
Electronic warfare uses radio-electronic and cryptographic techniques to degrade the communication
What is Economic Warfare?
Economic warfare affects the economy of a business or nation by blocking the flow of information
What is Intelligence-based Warfare?
Intelligence-based warfare is a sensor-based technology that directly corrupts technological systems
What are the five elements of Information Security?
Confidentiality, Integrity, Availability, Authenticity and Non-Repudiation.
What is Confidentiality defined as?
Assurance that the information is accessible only to those authorized to have access
What is Integrity defined as?
The trustworthiness of data or resources in terms of preventing improper or unauthorized changes
What is Availability defined as?
Assurance that the systems responsible for delivering, storing, and processing information are accessible when required by the authorized users
What is Authenticity defined as?
Refers to the characteristic of a communication, document, or any data that ensures the quality of being genuine