Definitions
Different hackers
Explain
What do they do
Examples
100

A ___ is a type of malicious email with some type of urgent or alarming message to deceive the target.

What is a hoax

100

What is a Whit Hat Hacker

What is a professional who helps companies find the vulnerabilities in their security. Also known as an ethical hacker. 

100

 is a type of malicious email with some type of urgent or alarming message to deceive the target.

an example of hoax

100

What do Cyberciminals do

What is using technology to steal sensitive information

100

The balloon boy hoax, a boy reported to be traveling uncontrollably at high altitudes in a home-made helium balloon but was later discovered to be hiding in the attic of his house.

what is a Hoax 

200

A ____ is a hacker with a political motive.

What is a hacktivist

200

What is a Gray Hat Hacker

What is a skilled hacker who falls in the middle of white hat and black hat hackers. The gray hat may cross the line of what is ethical, but usually has good intentions and isn’t malicious like a black hat hacker.

200

 is a denial of service attack  which shuts down a system to prevent customer access.

example of hackivist

200

What does SMishing do

What is using SMS to hack

200

 denial of service attack (DoS) which shuts down a system to prevent customer access.

Whats is a Hackvist 

300

___ is similar to spam, but the malicious link is sent to the target over instant messaging instead of email.

What is SPIM

300

What is a Black Hat Hacker

What is a skilled hacker who uses skills and knowledge for illegal or malicious purposes. 

300

 malware are usually lines of code hidden in the links spammers send to their victims.

example of spim

300

What does preloading do

What is influencing a target’s thoughts, opinions, and emotions before something happens. 

300

example of SPIM there is a popular Messenger scam that uses an enticing call to action “is that you in the video?” and a link leading users to a phony Facebook login page, where they attempt to steal people's FB login details.

what is a SPIM

400

A ______ is a professional who helps companies find the vulnerabilities in their security. Also known as an ethical hacker.

What is a White Hat Hacker

400

what is hacker groups

Hacker groups exploit weaknesses in software and systems

400
Companies hire White Hats to stress test their information systems. They run deep scans of networks for malware, like pen testing


example of white hat hacker

400

What does SPIM do

What is SPIM is similar to spam, but the malicious link is sent to the target over instant messaging instead of email. 

400

The "other Steve" of Apple, Steve Wozniak got started as a white-hat hacker by making something called blue boxes.

whats a White hat hacker 

500

_____ is pretending to be somebody else and approaching a target to extract information.

What is impersonation 

500

What is a Green Hat Hackers

Green hat hackers: Green hat hackers are “green” in the sense that they're inexperienced and may lack the technical skills of more experienced hackers. Green hats may rely on phishing and other social engineering techniques to bypass security systems.

500

 an impersonator may send an e-mail or phone call pretending to be a coworker, authority figure, or representative of a well-known company  

example of impersonation

500

What does Footprinting do

What is footprinting uses social engineering to obtain as much information as possible about an organization.

500

criminals use a fake email (through spoofing or hacking) of a high-level executive or important business entity.

What is impersonation

M
e
n
u