downtime - correct answer ✔refers to a period of time when a system is
unavailable
information security - correct answer ✔the protection of information from
accidental or intentional misuse by persons inside or outside of an
organization
hacker - correct answer ✔experts in technology who use their knowledge to
break into computers and computer networks, either for profit or just motivated
by the service or as a service to society
Hacktivism = Hacker + Activism - correct answer ✔the act of hacking or
breaking into a system for a politically or socially motivated purpose
black-hat hacker/cracker - correct answer ✔break into other people's
computer systems and may just look around or may steal and destroy
information
- crackers have criminal intent when hacking
white-hat hacker - correct answer ✔work at the request of the system
owners to find system vulnerabilities and plug the holes
grey hacker - correct answer ✔some combination of white hat hacker and
black hat hacker
script kiddies or script bunnies - correct answer ✔find hacking code on the
Internet and click-and-point their way into systems to cause damage or spread
viruses
, virus - correct answer ✔software written with malicious intent to cause
annoyance or damage
backdoor programs - correct answer ✔open a way into the network for future
attacks
denial-of-service attack (DoS) - correct answer ✔floods a website with so
many requests for service that it slows down or crashes the site
distributed denial-of-service attack (DDoS) - correct answer ✔attacks from
multiple computers that flood a website with so many requests for service that
it slows down or crashes. A common type is the Ping of Death in which
thousands of computers try to access a website at the same time, overloading
it and shutting it down
polymorphic viruses and worms - correct answer ✔change their form as they
propagate
Trojan-horse virus - correct answer ✔hides inside other software, usually as
an attachment or a downloadable file
worm - correct answer ✔spreads itself not only from file to file but also from
computer to computer
- do not need to attach to anything to spread and can tunnel themselves into
computers
a virus must attach to something to spread, whereas worms do not need to
attach to anything to spread and can tunnel themselves into computers