Ana

Subdecks (1)

Cards (94)

  • White hacker
    Ethical hacker who identifies and fixes vulnerabilities. With the permission of the owners
  • Black hacker
    Illegally cracks systems with malicious intent, they will try to exploit every information they got
  • Gray hacker
    They may not have a malicious intent. However they do it illegally
  • Gold hacker
    It's a white hat that serves for the cybersecurity team of national systems, it's legal and it's sponsored by the government
  • Red hacker
    A hacker that stops bye an aggressive action the black hat hackers, they are also illegall
  • What is a vulnerability? 

    Weakness or flaw in system, network, or application that can be exploited by attackers to compromise its security.
  • What is a cyberattack?
    Is a maliciou attempt to breach, damage, or disrupt computer systems, network, or divices using various methods such as malware, pishing, or denial-of-service attacks. 
  • What is an exploit? 
    Is a pice of software or code that takes advantage of a vulnerability in a system, aplication, or network to carry out a malicious action.
  • What is malware? 

    Malicious software designed to disrupt, damage or gain unauthorized acces to computer systems, networks, or devices. 
  • What is a Brute Force attack? 
    gain unauthorized access to a system or account by systematically trying all posible combinations of password or encryption keys until the correct one is fund  
  • How could a Brute Force attack be prevented? 
    Strong passwords, account lockout policies, rate limiting, multi-factor authentication, monitoring 
  • What is a DDoS attack? 
    Malicious attemt to discrupt the normal function of a targeted server, service, or network by overwhelming it with a flood of traffic from multiples sources.  
  • How could we prevent a DDoS attack? 
    DDoS protection services, Network and application firewalls, IDPS 
  • What does a white hacker do? Who do they work for? 
    Ethical hacker who identifies and fixes vulnerabilities. With the permission of the owners
  • Why are some hacking techniques considered to be more dangerous than others?
    Techniques that target infrastructure, compromise security, or violate privacy are typically viewed as more dangerous due to their for the impact. 
  • What kind of organization is Anonymous? 
    global hacker group known for online protests and has faced legal action due to their activities.
  • Is Anonymous a serious organization? Why or why not?  
    is an informal, worldwide network of hackers and activists.
  • How would you describe Anonymous’s mission? 
    promoting freedom of speech, fighting against censorship, and standing up against perceived injustice and corruption.  
  • What is Wikileaks? 
    international non-profit organization that publishes secret information, news leaks, and classified media provided by anonymous sources. 
  • What was the goal of Julian Assange when he founded Wikileaks? 
    was to create a platform for whistleblowers to anonymously leak classified or sensitive information to the public, with the aim of increasing transparency and holding governments and corporations accountable for their actions. 
  • Why did Julian Assange get in trouble with the American government? 
    due to WikiLeaks’ publication of classified documents, including diplomatic cables and military files. 
  • What used to be Edward Snowden relationship with the US government before he had to flee the country? 
    he was a contractor for (NSA) and previously worked for the Central Intelligence Agency (CIA). 
  • What conspiracy theory did Snowden prove true? 
    that governments were collecting vast amounts of data on their citizens without their knowledge or consent. 
  • What were Snowden’s motivations to become a whistleblower? 

    his concerns about the violation of privacy rights and civil liberties, as well as the lack of transparency regarding government surveillance programs. 
  • Why could Snowden be considered a traitor? 
    because he disclosed classified information and fled the country, potentially endangering national security and compromising intelligence-gathering methods. 
  • What is the definition of social engineering? 
    Social engineering is a technique used by attackers to manipulate individuals into divulging confidential information or performing actions that compromise security. 
  • Some tipes of haking
    SOCIAL ENGINEERING
    PHISHING
    BRUTE FORCE ATTACK
    SPAMMING
    WIFI SNIFFING
    PHONE SPOOFING
    DNS SPOOFING
  • Explain four common techniques of social engineering. 
    PRETEXTING
    Using a false justification to gradually gain trust and trick the victim.
    BAITING
    Luring the victim into performing a specific task.
    QUID PRO QUO
    A request for information in exchange for compensation.
    TAILGATING
    The act of following an authorized person into a restricted area or system.
  • Describe how phishing works. 
    attempt to extract sensitive personal data by impersonating a trusted source, usually a well-known organization.
  • How can you safeguard yourself against phishing? 
    Verify the sender's identity, Check URLs, Avoid sharing personal information, Use security software, Educate yourself 
  • What is the basic definition of spamming? 
    Electronic junk mail
    Unsolicited, often unwanted, email messages.
  • Mention one simple measure you can take against spamming. 

    is to enable spam filters on your email account. 
  • Describe how wi-fi sniffing works. What is it trying to accomplish? 

    it is typically carried out using specialized software.
  • How can you safeguard yourself against wi-fi sniffing? 
    Use encrypted connections, Avoid unsecured Wi-Fi networks 
  • How can you keep your computer systems protected from brute force attacks? Mention at least two separate methods. 
    Strong passwords, Account lockout policies 
  • malware is?
    Malicious software.
  • What are the three main ways malware interacts with data? 
    WORM
    TROJAN
    SPYWARE
    KEYLOGGER
    ADWARE
    VIRUS
  • What is a computer virus? 
    Programs or code that self-replicates or copies itself in order to spread to multiple devices in a network.
  •  What type of malware is referred to as a Trojan? 
    Malicious code or software that looks legitimate but can take control over a computer.
  • What is a computer worm? 
    A subset of Trojan malware that can propagate or self-replicate from one computer to another without human activation after breaching a system.