Any individual who has authorized access to an organization and either intentionally or unintentionally carries out an attack.
Is the process of manipulating others into providing sensitive information. Social engineering tactics include.
What is the use of social engineering
Software designed to take over or damage a computer without the user's knowledge or approval.
What is malware
A group of zombie computers that are commanded from a central control infrastructure.
What is a botnet
The 1987 ____ virus was one of the first viruses. It was very common and widespread in the early 1990s. The virus infects the master boot record of a hard drive and floppy disks.
What is stoned
A skilled hacker who uses knowledge and skills only for defensive purposes. A white hat hacker obtains explicit permission to interact a system or systems. These are the ethical hackers.
What is a white hat
A technical approach to obtaining information includes using software or utilities to find vulnerabilities in a system.
What is the use of technical approaches
A program that attempts to damage a computer system and replicate itself to other computer systems.
What is a virus
Malware designed to perpetrate identity theft. It allows a hacker access to online accounts at financial services, such as banks and online retailers.
The 1991 ______ virus was designed to infect MS-DOS systems and remain dormant until March 6, the birthday of Renaissance artist Michelangelo. The virus infects the master boot record of a hard drive. Once a system becomes infected, any floppy disk inserted into the system becomes immediately infected, as well.
What is Michelangelo
This hacker is also very skilled, but uses knowledge and skills for illegal or malicious purposes. A black hat is also known as a cracker. They are highly unethical.
What is a black hat
Is an alternative method of accessing an application or operating system for troubleshooting.
What is a backdoor.
A self-replicating malware program.
What is a worm
A person actively engaged in developing and distributing worms, Trojans, and viruses; engaging in probing and reconnaissance activities; creating toolkits so that others can hack known vulnerabilities.
What is a cracker
The 1999 ______ virus was the first computer virus that affected computer hardware. It infected executable files, then spread after the file was executed. After it was initiated, ____ would continue until the entire hard drive was erased. Then it would overwrite the system BIOS, causing machines to crash.
What is Chernobyl Virus/CIH
Falls in the middle of the white hat and black hat hackers. The gray hat may cross the line of what is ethical, but usually has good intentions and isn't malicious like a black hat hacker.
What is a gray hat
In security is the constant change in personal habits and passwords to prevent predictable behavior.
What is randomness
A malicious program that is disguised as legitimate or desirable software.
What is a trojan horse
Uses legitimate programs to infect a computer.
What is a fileless virus
The 1999 _____ worm was the first widely distributed macro virus that was propagated in the form of an email message containing an infected Word document as an attachment.
What is Melissa
Lack knowledge and sophistication, their attacks often seek to exploit well-known vulnerabilities in systems.
What is a script kiddie
Security measures should provide protection, but not be so complex that it is difficult to understand and use them.
What is simplicity
A computer that is infected with malware and is controlled by a command and control center called a zombie master.
What is a zombie
Malware designed to execute only under predefined conditions. It is dormant until the predefined condition is met.
What is a logic bomb
The 2001 _______ worm was designed to attack and exploit vulnerabilities within Microsoft Web IIS servers. It replicated from port to port with remarkable speed, infecting over 250,000 systems in under 9 hours.
What is Code Red