An electronic device that executes the instructions in a program.
What is a computer?
A medium of exchange for goods and services.
Fraudulent practice of sending emails to targets by pretending to be reputable senders.
A person who creates and modifies computer software/hardware.
What is a Hacker?
The act or practice of spying.
What is Espionage?
Sends orders to other parts of the computer.
What is the CPU/Central Processing Unit?
Part ownership in a company.
What are stocks?
Allows you or others to have a remote session on your computer.
What is Remote Desktop (RDP)?
The most notorious device used to generate tones to get free calls.
What is a Blue Box?
Intentional use of computers to access personal information for personal gain.
The most common type of memory found in computers/printers.
What is RAM/Random Access Memory?
Risk transfer from an individual to a company.
What is insurance?
Software that is unwanted and causes damage/compromises confidentiality.
What is Malware?
Hackers that explore phone systems.
What are Phone Phreakers?
To gain access to valuable government and business data and exploit other nations.
What is the goal of Nation-State Hacking?
Packets, Routers, Switches.
What are the parts that make the Internet work?
You can expect the stock will increase in value.
What is “Calls Option”?
Cyber rung that used malware called DNSChanger to infect around 4 million computers.
What is Operation Ghost Click?
Process of gaining information through leveraging good intentions, knowledge, and social systems.
Methodology of hacking used by a foreign government.
What is Advanced Persistent Threat (APT)?
He predicted that processing speeds would double every two years.
Who is Gordon Moore?
Agreements to exchange currencies at a future date.
What are “Forward Currency Contracts”?
This brought the internet to near collapse for several days in 1988.
What is the Morris Worm?
Reconnaissance, Scanning, Gaining Access, Maintaining Access, Covering Tracks.
What are the 5 Phases of Hacking Process?
What are “Chinese Tactics” for Nation-State Hacking?