Week 3.1

Cards (50)

  • Intellectual Property - The creation, and control of original ideas as well as the representation those ideas.
  • Intellectual Property - It can be a trade secrets, copyrights, and patents
  • Intellectual Property - It is protected by copyright law and other law, carries expectation of proper attribution or credit to its source and potentially requires the acquisition of permission for its use, as specified in those laws.
  • Software Piracy - It is the unauthorized duplication, installation, or distribution of copyrighted computer software, which is a violation of intellectual property.
  • Deviations in Quality of Service - It is a form availability disruption which can affect the availability of information and systems.
  • 3 Form of Disruption which can affect the availability of information and systems; Internet Service Issues, Communications and other provider issues, Power irregularities
  • Espionage or Trespass - It is well-known and broad category of electronic and human activities that can breach the confidentiality of information.
  • Espionage or Tresspass - It occurs when an unauthorized individual attempts to gain illegal access to organizational information
  • Hacker - A person who accesses systems and information without authorization and often illegally.
  • Two general categories of hacker; Expert Hacker and Novice Hacker
  • Expert Hacker - A hacker who uses extensive knowledge of the inner working of computer hardware and software to gain unauthorized access to systems and information.
  • Expert Hacker - they are also know as elite hackers, and they create automated exploits, scripts and tools used by other hacker
  • Novice Hacker - A relatively unskilled hacker who uses the work of expert hackers to perform attacks.
  • Novice Hacker - It is also know as neophyte or newbie that includes scripts kiddies and packet monkeys.
  • Script Kiddie - A hacker of limited skill who uses expertly written software to attack a system
  • Packet Monkey - A script kiddie who uses automated exploits to engage in denial-of-service- attacks.
  • Cracker - A hacker who intentionally removes and bypasses software copyright protection designed to prevent unauthorized duplication or use.
  • Phreaker - A hacker who manipulates public telephone system to make free calls or disrupt services.
  • Cracking - Attempting to guess or reverse-calculate a password
  • Brute force Password Attack - An attemp to guess a password by attempting every possible combination of characters and numbers in it.
  • Dictionary Password Attack - A variation of the brute force password attack that attempts to narrow the range of possible passwords guessed by using a list of common passwords and possibly including attempts based on the target's personal information.
  • Rainbow Tables - A table of hash values and their corresponding plaintext values that can be used to look up password values if an attacker is able to steal a system's encrypted password file.
  • Social Engineering Password Attack - It is the tactic of manipulating, influencing, or deceiving a victim in or to gain control over a computer system, or to steal personal and financial information.
  • Social Engineering Password Attack - It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.
  • Forces of Nature - It also called as acts of God, can present some of the most dangerous threats because they usually occur with little warning and are beyond the control of people.
  • Human error - This category includes acts performed without intent or malicious purpose or in ignorance by an authorized user.
  • Information Extortion - It is also know as cyberextortion where in the act of an attack or trusted insider who steals information from a computer system and demands compensation for its return or for an agreement not to disclose the information.
  • Sabotage or Vandalism - This category of threat involves the deliverate sabotage of a computer system or business or acts of vandalism to destroy an asset or damage the image of an organization.
  • Cyberterrorist - A hacker who attacks systems to conduct terrorist activities via networkd or internet pathways.
  • Cyberwarfare - Formally sanction offensive operations conducted by a government or state against information or systems of another government or state.
  • Software Attacks - Occurs when an individual or group designs and deploys software to attack a system
  • Software Attacks - This attack can consist of specially crafted software that attackers trick users into installing on their systems
  • Adware - Malware intended to provide undesired marketing and advertising, including popups and banners on a user's screens.
  • Boot virus - It is also known as boot sector virus, it is a type of virus that targets the boot sector or master boot record of a computer systems hard drive or removable storage media.
  • Spyware - Any technology that aids in gathering information about people or organizations without their knowledge.
  • Trojan Horse - A malware program that hides its true nature and reveals its designed behavior only when activated.
  • Virus - A type of malware that is attached to other executable programs. Whe activated, it replicates and propagates itself to multiple systems.
  • Worm - A type of malware that is capable of activation and replication without being attached to an existing program
  • Back Door - A malware paylod that provides access to a system by bypassing normal access controls.
  • Denial-of-Service Attack - An Attack that attempts to overwhelm a computer target's ability to handle incoming communications, prohibiting legitimate users from accessing those systems.