Hackers & Deceptive Threats
Cyber Attacks & Security Measures
100

Define: White hat hackers 

(Good guys) search for weaknesses, but don’t exploit them. Share their knowledge of holes they found within a system for them to be "plugged" causing to security improv.


100

Define Botnets

A system that is capable of sending out 100 billion spam messages a day 

200

Who are known as the (bad guys) - who are the harmful hackers?

 black hat hackers

200

Sending spam from thousands of difficult-to-shut-down accounts, launching tough-to-track click fraud

 efforts or staging what’s known as .......... attacks 

 distributed denial of service (DDoS)

300

spyware definition + example

Definition: software that collects information from a computing system without your consent 

Example: PhoneSpy-spyware virus that pretends to be a mobile application to gain access to and infect Android mobile devices 

300

encryption definition + example of use

 the process of protecting information or data by using mathematical models to scramble it in such a way that only the parties who have the key to unscramble it can access it 

This happens through messaging apps like signal

400

... attacks are a form of social engineering. 

What does it do?

Phishing-cyberattack that uses fraudulent emails, text messages, phone calls or websites to trick people into sharing sensitive data, downloading malware or otherwise exposing themselves to cybercrime

400

Cybercriminals use ...... to steal sensitive information, disrupt operations, gain unauthorized access, or demand ransoms from individuals or organizations. Example being spyware (give definition)

Malware-any software intentionally designed to harm, exploit, or otherwise compromise devices, networks, or data

500

A hacker posing as an IT support technician calls an employee, claiming there’s a system issue, and tricks them into revealing their login credentials. 

what is it + definition

social engineering: impersonating representatives of legitimate organizations to manipulate people into supplying information such as passwords or personal details 

500

A network security system is set up to prevent unauthorized access from outside sources, but a mistake in the setup unintentionally exposes internal data to external threats. 

What is it?+ definition

firewall-a network security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies

M
e
n
u