(Blank)
(Blank)
(Blank)
100

Definition of MALWARE

short for malicious software, refers to any intrusive software developed by cybercriminals to steal data and damage or destroy computers and computer systems. Examples of common malware include viruses, worms, Trojan viruses,spyware, adware, and ransomware.

100

Definition of KEYLOGGER

a type of surveillance softaware or hardware that silently records every keystroke made on a computer or mobile device. They can be installed via phishing, e-mail or malicious downloads

100

Definition of ADWARE

a software that displays unwanted (and sometimes irritating) pop-up adverts which can appear on your computer or mobile device. Adware typically ends up on a user’s device through:

1) installation of a free computer program or app without necessarily realizing that it contains additional software that contains adware. This allows the app developer to make money but means you could download adware onto your systems withoutnecessarily consentingto it.

2) exploitation of a vulnerability in your software or operating system

200

Definition of SCAREWARE

It is a cyberattack tactic that scares people into visiting spoofed or infected websites or downloading malware. Scareware can come in the form of pop-up ads that appear on the screen or spread through spam email attacks. Its aim is to scare computer users into thinking they have a major problem with their device.

The hacker uses pop-up warnings to tell them their computer has been infected with dangerous viruses that could cause it to malfunction or crash. Some scareware ads also report hundreds of viruses that are supposedly present on your device but are actually fake results. Typically, the more menacing or shocking an ad pop-up sounds, the more likely the

claims being made are scareware.

200

The difference between ENCRYPTION and CRYPTOGRAPHY

CRYPTOGRAPHY is the science of creating secret codes while ENCRYPTION is part of it

200
Definition of RANSOMWARE

is a malware that employs encryption to hold a victim’s information at ransom. A user or organization’s critical data is encrypted so that they cannot access files, databases, or applications. A ransom is then demanded to provide access. Ransomware is often designed to spread across a network and target database and file servers, and can thus quickly paralyze an entire organization.

300

Definition of HIJACKING in cyber security

an attack in which unauthorized actors seize control of an active user session, network connection or system component to impersonate a legitimate user and steal data

300

explain what type of techinque is DATA EXFILTRATION in ethical hacking

unauthorized transfer of data from a computer using malware or spyware (phishing)

300

explain the difference between HACKERS and CRACKERS

  • A hacker is someone who uses their technical skills to understand, improve, or test computer systems and networks.

    • Focus on exploring and improving systems

    • Often work in cybersecurity

    • May find and report vulnerabilities

    • Can be ethical and legal

  • A cracker is someone who illegally breaks into systems or software to cause harm or gain unauthorized benefits.

    • Bypasses security protections

    • Often involved in software piracy, stealing data, or damaging systems

    • Activities are illegal and malicious

400

Explain the difference between DOS and DDOS attacks

A Denial-of-Service (DoS) attack comes from a single computer or internet connection. An attacker sends a huge number of requests to a server and the server becomes overloaded and cannot respond to normal users. 

A Distributed Denial-of-Service (DDoS) attack comes from many computers at the same time.These computers are often part of a botnet (a network of hacked or infected devices controlled by the attacker) that are able to send thousands or even millions of requests simultaneously so the server gets overwhelmed by massive traffic.

400

explain what type of techinque is RECONNAISSANCE in ethical hacking

map out the target’s digital footprint to identify its target weaknesses (gather information, browse social media, search public databases)

400

Difference between PHISHING and SPOOFING

PHISHING --> it refers to the act of using a fake identity (created with spoofing) to deliberately steal credentials or install malware. Its aim is to induce the victim to click on a malicious link or attached file to steal data 

SPOOFING --> it refers to the practice of forging identity to gain the trust of the victim and bypass their defenses. It disguises the attacker as a trusted source 

500

What are the three main phases of an ethical hacking mission

  • SCOPING PHASE à it’s the step in which everyone agrees on the plan and boundaries are set before the test starts; the team decides what they are trying to achieve and the rules to follow
  • SIMULATED ATTACK PHASE à it’s the step in which the hackers try to actually get into the system but in a safe and controlled way.
  • FEEDBACK PHASE à it’s the final step in which the team writes a report that documents the vulnerabilities and possible countermeasures
500

explain what type of techinque is PIVOTING in ethical hacking

is a technique that transforms a compromised machine into a “stepping stone” to blend with legitimate network traffic and bypass firewalls

500

explain what type of techinque is PRIVILEGE ESCALATION in ethical hacking

a technique that exploits bugs or configuration errors to gain higher-level permission than intended ( ex: upgrade from standard to administrator)