What is a virus that self-replicates and spreads to other computers?
Worm
Includes websites that are intentionally hidden and only accessible through a special browser
darknet
gives access to the anonymous websites on the darknet; stands for “the onion router” browser
TOR browser
act of circumventing or breaking past security boundaries
Hacking
Why is it important to use strong and unique passwords for online accounts?
To enhance security and prevent unauthorized access
Includes resources located on the internet, such as governmental databases, member-only sites, etc. That are not found with a typical search engine.
deep web
slang term used to describe an individual who uses premade tools to perform their attacks
Script Kiddie
ethical and law-abiding
White hack hacker
How can you identify phishing emails and protect yourself from phishing attacks?
By checking sender's email address, avoiding clicking on suspicious links, and verifying requests for sensitive information
includes websites and resources that can be located and accessed using a standard web browser, like chrome.
The Internet
offers rewards for flaws and vulnerabilities found in their program
Bug-Bounty Program
operates outside the law
Black hat hacker
Define two-factor authentication and explain why it is more secure than single-factor authentication
two-factor authentication requires two forms of verification to access an account, making it harder for unauthorized users to gain access
connection involves data being rerouted through many computers before you are delivered to your destination
Onion Network
malicious software code that is unleashed and attempts to perform its destructive content
Virus
do no harm, but do not ask for permission
Gray hat hacker
What are common types of cyber threats that individuals and organizations face?
Malware, phishing, ransomware, DDoS attacks, etc.
Aim is to target and harm companies or individuals with whom they have a fundamental disagreement
Hacktivism
hacking into a phone system
avenue or path hacker uses to commit the attack
Attack Vector