ECM 1407 Computer Misuse: Hacking Flashcards

1
Q

The definition of a Hacker:

A

A person who enjoys exploring the details of programmable systems and how to stretch their capabilities as opposed to most users, who prefer to learn only the minimum necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The 3 eras of hacking

A

Era 1: The joy of programming
Era 2: Dark Side
Era3: a destructive and criminal tool

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Skill level and hacker types:

A
  • Master
    ○ The ability to create new attack toolkits
    ○ Hard to defend against with zero-delay vulnerabilities
  • Journeyman
    ○ Has the ability to modify attack toolkits
    ○ Attacks are more targeted and harder to defend against
  • Apprentice
    ○ Has basic understanding of how to use attack toolkits.
    ○ Responsible for the highest volume of attacks, but their attacks are the easiest to defend against.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The different shades of hacker:

A
  • Black-hat hackers
    ○ People who try to break into systems/networks to exploit them for malicious reasons.
  • Gray-hat hackers
    ○ They don’t use their capabilities for personal gain, but rather unofficially breach a system/network for the purpose of either practise or notifying the affected corporation
  • White-hat hackers
    - Ethical hackers who find vulnerability in systems to help strengthen the security of these systems. They are employed by companies for this.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some factors contributing to security vulnerability?

A
  • Inherent complexity of computer systems
  • Impossibility of bug-free software
  • Human nature and social engineering
  • Interconnectivity
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a computer virus?

A

A piece of software attached to genuine files (i.e., host file) designed to replicate itself and perform malicious actions (e.g., delete files) when activated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a computer worm?

A

A standalone piece of software that performs malicious actions and can replicate itself without the need of a host file to work

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a backdoor?

A

A malware that allows access to a particular system at a future time by bypassing normal layers of security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a trojan horse?

A

A program that looks like a genuine application but includes a component that performs malicious actions (e.g., sending spam, installing viruses, creating a backdoor)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is ransomware?

A

A ransomware is a malware that encrypts files on a computer and then displays a message demanding payment for the key to decrypt the files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define social engineering

A

Social engineering is the manipulation of people into releasing sensitive information on performing a task that often weakens security measures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define phishing

A

Phishing is a type of fraud in which an attacker sends a message to trick a victim into revealing sensitive information or performing a task

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define hacktivism

A

Hacking for politically or socially motivated purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Hacktivism examples

A
  • Anonymous group has taken offline 40 sites that traded images of child sexual abuse
  • Syrian Defense Ministry website hacked also by anonymouse
  • Hackers cracked emails of pro-kremlin activists and officials
  • The Sony Playstation network was taken offline by “LulzSec”
How well did you know this?
1
Not at all
2
3
4
5
Perfectly