White Hat Terms
Security in Cyberspace/Information Warfare
100

An Ethical Hacker is known as what type of "hat."

White Hat

100

Operations that target or exploit information media in order to win some objective over an adversary.

Information Warfare

200

Term that refers to pre-attack phase where hackers collect information.

Footprinting or Reconnaissance

200

What year did the military realize that IT was critical to contemporary warfare?

1990s

300

Type of testing that gives the ethical hacker full knowledge of the IT infrastructure

White Box testing

300

What three elements affect computers and cybersecurity

Confidentiality, Integrity, Accessibility

400

Refers to a previously known security vulnerability that is exploited before the vendor can release a patch.

Zero-day exploit

400

What are the three parts of Computer Security

Data Security, System Security, Network Security

500
Process that informs an organization about a vulnerability before it is publicly disclosed.

Responsible Disclosure

500

What is the difference between a virus and a worm?

A virus is a self-replicating program that attaches itself to other code, while a worm is a stand along program that targets network resources.