Terminology Flashcards
Learn definitions to various Ethical Hacking Terminology.
What are White Hats?
Good Guys, ethical hackers who use their skills for defensive purposes
They put their mind into the mind of a Black hat to defend against them.
What defines Gray Hats?
Self-proclaimed ethical hackers whose actions can be good or bad depending on the situation
They are typically interested in hacker tools from a curiosity standpoint.
Who are Black Hats?
Bad guys or malicious attackers who use their skills for illegal or malicious purposes
They are often compared to the Sith.
What are the four basic elements of security?
- Confidentiality
- Authenticity
- Integrity
- Availability
What is a confidentiality attack?
Stealing passwords or other data that allows unauthorized access
This compromises the confidentiality of information.
What is an authenticity attack?
MAC address spoofing that allows unauthorized devices to connect to a network
This is particularly relevant in wireless networks.
What constitutes an integrity attack?
Bit-flipping attacks where data may be tampered with in transit
This affects the reliability of the data.
What is an availability attack?
Denial-of-service (DoS) attack that overloads a system so it can’t be accessed
This targets the availability of systems and networks.
Define ‘Threat’ in cybersecurity terms.
A situation that could lead to a potential breach of security.
What is an ‘Exploit’?
A piece of software or technology that takes advantage of a bug or vulnerability
This leads to unauthorized access of a system.
What does ‘Vulnerability’ mean?
The existence of a software flaw or error that can lead to undesirable events
This can execute damaging instructions to the system.
What is a Target of Evaluation (TOE)?
A system, program, or network that is the subject of a security analysis or attack.
What is a Remote exploit?
An exploit sent over a network without prior access to the vulnerable system.
What is a Local exploit?
An exploit delivered directly to a computer system requiring prior access
This is used to increase privileges.
What happens during an attack?
A system is compromised based on vulnerability.
What is a Virus/Trojan?
A virus embedded in something downloaded or installed.
What is Phishing?
Replicating websites to capture login credentials.
Define Eavesdropping.
Monitoring someone without their knowledge.
What is a Fake WAP?
A fake Wi-Fi network designed to access your data.
What are Waterhole Attacks?
Attacks targeting locations with higher traffic.
What is DDoSing?
Flooding traffic to crash a site
This is a type of Denial of Service attack.
What does a Keylogger do?
Tracks keystrokes on a device.
Define Social Engineering.
Psychological manipulation to obtain confidential information.
What is Bait & Switch?
Fake ads leading to a page with a virus.