Week 1 - Overview Flashcards

1
Q

Motive

A

For the thrill of it or for criminal purposes​.

Revenge, disgruntled current or former employees .

Financial gain through theft of financial information.

Corporate proprietary information, which can be sold.

Acts of terrorism, stating political statements against governments, etc.​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ethical Hacking​

A

Professionals who work to identify loopholes and vulnerabilities on systems, report it to the vendor or owner of the system, and also, at times, help them fix it.​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Penetration Testing​

A

A more professional term used to describe what an ethical hacker does.​

It’s a legal attempt to break into a company’s network to find its weakest link​

The tester only reports findings, does not solve problems.​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vulnerability Assessment​

A

At times organizations might want to only identify the vulnerabilities that exist in their systems without actually exploiting it and gaining access. ​

The end result is a report prioritizing the vulnerabilities found, with the most severe ones on the top and the ones posing lesser risk lower in the report. ​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Security Audits​

A

A systematic procedure that is used to measure the state of a system/network and company’s security policies and procedures against a predetermined set of standards.​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hackers

A

Access computer system or network without authorization​.

Breaks the law; can go to prison​.

Black Hat, White Hat, and Gray Hat.

Suicide, State Sponsored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Crackers​

A

Break into systems to steal or destroy data​.

U.S. Department of Justice calls both hackers​.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ethical Hacker​

A

Performs most of the same activities with owner’s permission​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Script Kiddies​

A

Younger, inexperienced hackers who copy codes from knowledgeable hackers​.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Packet Monkey

A

Blocking sites through DDOS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Cyber Terrorists

A

Attackers who have ideological motivation​.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hacktivists

A

Another group motivated by ideology​.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

State-Sponsored Attackers

A

Attackers supported by governments for launching computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Languages used

A

Perl, C, C++, Python, JavaScript, Visual Basic, SQL, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Tiger box​

A

Collection of OS’s and hacking tools​.

Usually on a laptop​.

Helps penetration testers and security testers conduct vulnerabilities assessments and attacks​.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

White Box Model​

A

Tester is told everything about the network topology and technology​:

Network diagrams​.
Equipment types​.
Authorized to interview employees.
Makes testers job easier.

17
Q

Black Box Model​

A

Staff does not know about the test​.

Tester is not given details about technologies used​.

Burden is on tester to find details​.

Tests security personnel’s ability to detect an attack​.

18
Q

Gray Box Model​

A

Hybrid of the white and black box models​.

Company gives tester partial information (e.g. OSs are used, but no network diagrams)​.