Intentional, unauthorized access to computer systems
What is hacking?
Malware that can monitor and record user activities on a computer or mobile device
What is spyware?
Various crimes in which a criminal or group steals and uses the identity of an individual
What is identity theft?
This began as the APARNET
What is the internet?
In this time period, hacking was used as a positive term
What is hacking Era 1 (What are the 1960s and 70s)?
A small portion of a program that can replicate itself and perform other functions such as deleting files or sending emails
What is a virus?
The use of hacking to promote a political cause
What is hacktivism?
The chapter of the book this presentation was on
What is chapter 5?
This cryptocurrency exchange had over $30 million stolen by hackers this year.
What is Crypto.com?
Email or text messages asking for account numbers, passwords, and other identifying information
What is phishing?
Our credit cards, passport numbers, passwords, social security numbers, and other personal information
What is private data?
Provide a user-controlled, stable, and secure system
What is the goal of operating systems?
Sensitive information was stolen to make stock market trades in this country
What is Ukraine?
Malware that appears to be a benign software application but carries a malicious component
What is a trojan horse?
A piece of software that allows someone to send tokens out of one blockchain network and receive them on a separate chain
What is a bridge?
Established the vulnerability of the Internet as a whole to malicious hacking
What is the Internet Worm?
Focused on big research centers, corporations, or government agencies
What is "trophy" hacking?
The manipulation of people into releasing information or performing a task that violates security protocols
What is social engineering?
Three teenagers hacked into the network of an atomic research center in this country
What is India?
Has the personality type ISTJ
Who is Lucas Schee?