creative problem solving used to gain unauthorised access to or control over a computer system
What is HACKING?
What is Kali?
A branch of forensic science encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime.
This is the word for the metadata stored in digital images
What is EXIF?
The "weakest link" in any computer system
What are PEOPLE?
The most common reason hackers hack
What is money/financial gain?
The Linux command used to list the contents of a directory
What is ls?
Under the 1986 federal Computer Fraud and Abuse Act (CFAA), this is the maximum prison sentence that can be imposed
What is 10-20 years?
This is a job title for someone hired by a company to test system security (a type of White Hat hacker)
What is a PEN TESTER?
When a hacker gains access to a computer or network and considers the system to be owned or dominated.
What is "Pwning"?
In the 1960's and 1970's some people would hack into telecommunications systems, especially to obtain free calls.
What is PHREAKING?
the type of path name used to describe the location of a file or folder in Linux which starts from the root directory
What is an ABSOLUTE PATH?
In order to comply with federal laws, police must get this before they can examine a user's cell phone data.
What is a warrent?
This type of cryptomalware attack which affected both UCSF and Garmin recently is very much on the rise.
What is RANSOMWARE?
This is the most common mobile OS. It is based on Linux.
What is Android OS?
Hackers without knowledge; use tools & attempt to hack
What are SCRIPT KIDDIES?
What is using a . at the beginning of the name?
This is a bit-for-bit copy of a hard drive made by investigators to examine so that the original stays unaltered
What is a (disk) image?
A container that prevents a cell phone inside from receiving external cell signals
What is a Faraday bag (or box or cage)?
One type of Ethical Hacking is finding weaknesses/bugs/vulnerabilities in software or systems and reporting them to the company for a reward.
What is a BUG BOUNTY?
The Decade in which the first computer worm was created
When was the 1980s?
Linux operating system, created by Linus Torvalds, is open-source software based on what previous OS?
What is UNIX?
The hacker who leaked highly classified information from the National Security Agency (NSA) in 2013.
Who is Edward Snowden?
A controlled and restricted environment for programs or code where it can run with minimal risk of causing widespread damage to the system (it can be used to safely isolate/identify of malware)
What is a SANDBOX?
Social Engineering--manipulating people to reveal information or do something they wouldn't otherwise do--works for reasons such as this
What is (name any of these) Authority/Intimidation/Consensus/Scarcity/Urgency/Promise of a Reward?