Chapter 3 Flashcards
(30 cards)
anyone with technical skills, but it often refers to a person who uses his or her abilities to gain unauthorized access to systems or networks in order to commit crimes.
Hacker
A type of hackers work doing penetration, hired to attempt to break into the company’s networks to find and report on security vulnerabilities.
White Hat Hacker
Also known as ethical hackers
White Hat Hacker
This type of hackers are criminals by definition because they violate laws against accessing systems without authorization but they may also engage in other illegal activity, including identity theft and distributed denial-of-service attacks.
Black Hat Hacker
Fall somewhere between white hat hackers and black hat hackers.
Gray Hat Hacker
an attacker can buy advertising spaces on the websites. Later, when a user clicks on the ad, he might get directed to a page that’s infected with malware.
Bait and switch
This way, they can further install malware or adware on your computer. The ads and download links shown in this technique are very attractive and users are expected to end up clicking on the same.
Bait and switch
The cookies of a browser keep our personal data such as browsing history, username and passwords for different sites that we access.
Cookie theft
also known by a different name, IU Redress
Clickjacking attack
this type of hacking, the attacker hijacks the clicks of the victim that aren’t meant for the exact page, but for a page where the hacker wants you to be. It works by fooling an internet user into performing an undesired action by clicking on hidden link.
Clickjacking attacks
This are malicious software programs which get installed into the victim’s system and keeps sending the victims data to the hacker.
Virus or Trojans
They can also lock your file serve fraud advertisement, divert-traffic, sniff your data, or spread on all the computer connected to your network.
Virus or Trojans
a hacking technique using which a hacker replicates the most-accessed sites and traps the victim by sending that spoofed link.
Phishing
a hacker just monitors the computer systems and networks to gain some unwanted information.
Eavesdropping
hack takes place in public spaces where there is free WiFi.
Fake Wap
The goal is to infect a targeted user’s computer and gain access to the network at the target’s workplace.
Waterhole attacks
a security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit.
Waterhole attacks
An attack meant to shut down a machine or network, making it inaccessible to its intended users.
Denial of Service
A form of malware or hardware that keeps track of and records your keystrokes as you type.
Keylogger
Take a close look at want information you store and what you need to store
Avoidance
I think this is self-explanatory, prevent the removal of data from the business, etc.
Prevention
Take measure like placing limits on the amount that can be withdrawn from a bank account at any time.
Reduction
Separate customer data from the internet by only accessing it on a computer that doesn’t have an internet connection or email account.
Separation
You actually want to reduce the duplication of customer data. You may want to duplicate firewalls, etc.
Duplication