A ___ is a type of malicious email with some type of urgent or alarming message to deceive the target.
What is a hoax
What is a Whit Hat Hacker
What is a professional who helps companies find the vulnerabilities in their security. Also known as an ethical hacker.
is a type of malicious email with some type of urgent or alarming message to deceive the target.
an example of hoax
What do Cyberciminals do
What is using technology to steal sensitive information
The balloon boy hoax, a boy reported to be traveling uncontrollably at high altitudes in a home-made helium balloon but was later discovered to be hiding in the attic of his house.
what is a Hoax
A ____ is a hacker with a political motive.
What is a hacktivist
What is a Gray Hat Hacker
What is a skilled hacker who falls in the middle of white hat and black hat hackers. The gray hat may cross the line of what is ethical, but usually has good intentions and isn’t malicious like a black hat hacker.
is a denial of service attack which shuts down a system to prevent customer access.
example of hackivist
What does SMishing do
What is using SMS to hack
denial of service attack (DoS) which shuts down a system to prevent customer access.
Whats is a Hackvist
___ is similar to spam, but the malicious link is sent to the target over instant messaging instead of email.
What is SPIM
What is a Black Hat Hacker
What is a skilled hacker who uses skills and knowledge for illegal or malicious purposes.
malware are usually lines of code hidden in the links spammers send to their victims.
example of spim
What does preloading do
What is influencing a target’s thoughts, opinions, and emotions before something happens.
example of SPIM there is a popular Messenger scam that uses an enticing call to action “is that you in the video?” and a link leading users to a phony Facebook login page, where they attempt to steal people's FB login details.
what is a SPIM
A ______ is a professional who helps companies find the vulnerabilities in their security. Also known as an ethical hacker.
What is a White Hat Hacker
what is hacker groups
Hacker groups exploit weaknesses in software and systems
example of white hat hacker
What does SPIM do
What is SPIM is similar to spam, but the malicious link is sent to the target over instant messaging instead of email.
The "other Steve" of Apple, Steve Wozniak got started as a white-hat hacker by making something called blue boxes.
whats a White hat hacker
_____ is pretending to be somebody else and approaching a target to extract information.
What is impersonation
What is a Green Hat Hackers
Green hat hackers: Green hat hackers are “green” in the sense that they're inexperienced and may lack the technical skills of more experienced hackers. Green hats may rely on phishing and other social engineering techniques to bypass security systems.
an impersonator may send an e-mail or phone call pretending to be a coworker, authority figure, or representative of a well-known company
example of impersonation
What does Footprinting do
What is footprinting uses social engineering to obtain as much information as possible about an organization.
criminals use a fake email (through spoofing or hacking) of a high-level executive or important business entity.
What is impersonation