An unwelcome system intruder with malicious intent.
What is a cracker?
100
Code designed to breach system security and threaten digital information; often called a virus.
What is malicious code?
100
Attacks on a system that can include snooping, eavesdropping, and interception; more commonly known as spying or illicitly gaining access to protected information.
What is access attacks?
100
The relationship between vulnerability and threat.
What is risk?
100
Subverting the phone system to get free service.
What is phreaking?
200
Generally, a cracker motivate by greed and/or politics.
What is s directed (targeted) hacker?
200
An uninvited guest program with the potential to damage files and the operating system.
What is a virus?
200
a software program, such as Wireshark, that allows the user to listen in on network traffic.
What is a sniffer?
200
The sensitivity of information combined with the skill level the attacker needs to threaten that information.
What is vulnerability?
200
Shortcuts into programs created by system designers to facilitate system maintenance but used and abused by crackers.
What is backdoors?
300
An amateur hacker who simple uses the hacking tools developed by others.
What is a script kiddie?
300
A type of bot that can roam a network looking for vulnerable systems and replicate itself on those systems.
What is a worm?
300
Attacks on a system that alter information illegally.
What is modification attacks?
300
The likely agent of a possible attack, the event that would occur as a result of an attack, and the target of the attack.
What is a threat?
300
A program tries to place more information into a memory location than that location can handle.
What is buffer overflow?
400
Cracking into s system as a political act; one political notion is that cracking itself is useful for society.
What is hacktivism?
400
A software program that roam the Internet autonomously; can be quite benign and useful, such as those used to help in search results.
What is a bot?
400
Attacks that prevent legitimate users from using the system or accessing information.
What is denial of service (DOS) attacks?
400
Ensuring that only those authorized to access information can do so.
What is confidentiality?
400
Picking thorough people's trash to find glean potentially damaging information.
What is dumpster diving?
500
A document, written anonymously, that justifies cracking ito systems as an ethical excuse.
What is a Hacker's Manifesto?
500
A program that poses as an innocent program; some action or passage of time triggers the program to do its dirty work.
What is a Trojan program?
500
Attacks on a system that injure the information' reliability; might remove evident that an even actually did occure.
What is repudiation attacks?
500
Transforming original data into coded data so that only authorized parties can interpret it.
What is encryption?
500
Assurance that information is what you think it is and hasn't been modified.