Chapter 3 Flashcards

(30 cards)

1
Q

anyone with technical skills, but it often refers to a person who uses his or her abilities to gain unauthorized access to systems or networks in order to commit crimes.

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A type of hackers work doing penetration, hired to attempt to break into the company’s networks to find and report on security vulnerabilities.

A

White Hat Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Also known as ethical hackers

A

White Hat Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This type of hackers are criminals by definition because they violate laws against accessing systems without authorization but they may also engage in other illegal activity, including identity theft and distributed denial-of-service attacks.

A

Black Hat Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fall somewhere between white hat hackers and black hat hackers.

A

Gray Hat Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

an attacker can buy advertising spaces on the websites. Later, when a user clicks on the ad, he might get directed to a page that’s infected with malware.

A

Bait and switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This way, they can further install malware or adware on your computer. The ads and download links shown in this technique are very attractive and users are expected to end up clicking on the same.

A

Bait and switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The cookies of a browser keep our personal data such as browsing history, username and passwords for different sites that we access.

A

Cookie theft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

also known by a different name, IU Redress

A

Clickjacking attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

this type of hacking, the attacker hijacks the clicks of the victim that aren’t meant for the exact page, but for a page where the hacker wants you to be. It works by fooling an internet user into performing an undesired action by clicking on hidden link.

A

Clickjacking attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This are malicious software programs which get installed into the victim’s system and keeps sending the victims data to the hacker.

A

Virus or Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

They can also lock your file serve fraud advertisement, divert-traffic, sniff your data, or spread on all the computer connected to your network.

A

Virus or Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a hacking technique using which a hacker replicates the most-accessed sites and traps the victim by sending that spoofed link.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a hacker just monitors the computer systems and networks to gain some unwanted information.

A

Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

hack takes place in public spaces where there is free WiFi.

A

Fake Wap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The goal is to infect a targeted user’s computer and gain access to the network at the target’s workplace.

A

Waterhole attacks

17
Q

a security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit.

A

Waterhole attacks

18
Q

An attack meant to shut down a machine or network, making it inaccessible to its intended users.

A

Denial of Service

19
Q

A form of malware or hardware that keeps track of and records your keystrokes as you type.

20
Q

Take a close look at want information you store and what you need to store

21
Q

I think this is self-explanatory, prevent the removal of data from the business, etc.

22
Q

Take measure like placing limits on the amount that can be withdrawn from a bank account at any time.

23
Q

Separate customer data from the internet by only accessing it on a computer that doesn’t have an internet connection or email account.

24
Q

You actually want to reduce the duplication of customer data. You may want to duplicate firewalls, etc.

25
This is the biggest one, transfer the risk of storing credit card data to a third-party processor like PayPal or your bank. Let them take the risk of storing credit cards.
Transfer
26
As a last resort, be aware of the risk you face but if you cannot effectively manage it, you must retain it or avoid it.
Retention
27
The attacker tries to manipulate you into giving them either your information or access to your computer so that they can get the information themselves.
Social engineering
28
malicious software that will damage or harm your computer, network or information with the sole intent of infecting your system, allowing the attacker to do anything they want with it or the information , or benefit from taking control of the device or the information.
Malware
29
Users will be denied access to their information unless they pay a ‘ransom’ to the attacker – usually in an electronic currency such as bitcoin.
Ransomware
30
a type of malware that is delivered by social engineering and blocks access to the information stored on your device/system.
Ransomware