Protects the network by controlling what traffic is allowed in, as well as allowed out
Destroys data and can slow down a computer
What is a Virus
Hardware or software that prevents hackers from accessing your personal or company data
What is a Firewall
These attackers make political statements, or create fear, by causing physical or psychological damage to the victim(s)
What are Terrorists
What is a Kill Chain
A self-replicating pieces of software that travel to new computers without any intervention or knowledge of the user
What are Worms
What is an Antivirus Program
An internet-based conflict that involves the penetration of information systems of other nations
The process of probing a computer, server, or other network host for open ports
What is Port Scanning
Used in security attacks as infected machines that carry out a DDoS attack
What are Zombies
Monitors online activities and collects personal information without permission
What is Spyware
These type of attackers make political statements in order to create an awareness of issues that are important to them
What are Hacktivists
A tool used to gather information about data flowing through a network
What is a NetFlow
The purpose is to gain privileged access to a device while concealing itself
Connect to a specific wireless network by the way of a network identifier
Service Set Identifier (SSID)
These attackers father intelligence or commit sabotage on specific goals on behalf of their government
This attack disrupts services by simply overwhelming servers and network device with bogus traffic
What is a DDoS attack
An attack in which the primary goal is to prevent the target server from being able to handle additional requests
What is a DoS Attack
This tool provides a list of open ports on network devices
What is Nmap
Discovering weaknesses of networks and systems to improve their security level is the motivation behind this type of attacker