Chapter 1 Introduction to Cybersecurity Questions Graded A+
7 views 0 purchase
Course
Cyber security
Institution
Cyber Security
Chapter 1 Introduction to Cybersecurity Questions Graded A+
attack vector
avenue or path a hacker uses to commit the attack
black-hat hacker
operates outside the law (bad)
cyberattack
attempts to steal, damage or destroy data or computer system
cybersecurity
process of pro...
attack vector avenue or path a hacker uses to comm
darknet part of the internet that is not easily
hacktivism aim is to target and harm companies
Written for
Cyber security
Cyber security
Seller
Follow
julianah420
Reviews received
Content preview
Chapter 1 Introduction to Cybersecurity
Questions Graded A+
attack vector - answer avenue or path a hacker uses to commit the attack
black-hat hacker - answer operates outside the law (bad)
cyberattack - answer attempts to steal, damage or destroy data or computer system
cybersecurity - answer process of protecting a system against unintended or malicious
changes or use
darknet - answer- part of the internet that is not easily accessible to the average user
- represents the underground of the internet
deepweb - answer includes resources not found within a typical search engine
gray-hat hacker - answer does no harm, but doesn't ask for permission (neutral)
hacking - answeract of circumventing or breaking past security boundaries
hacktivism - answer- aim is to target and harm companies or individuals with whom they
have a fundamental disagreement
- hacking in an effort to convey a social or political message
onion network - answer- connection involves data being rerouted through many
computers before you are delivered to your destination
- a technique for anonymous communication over a computer network
phreaking - answerhacking into a phone system
script kiddie - answerslang term used to describe an individual who uses premade tools
to perform their attacks
tor browser - answer- gives access to the anonymous websites on the darknet
- stands for "The Onion Router" browser
virus - answermalicious software code that is unleashed and attempts to perform its
destructive content
white-hat hacker - answerethical and law-abiding (good)
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller julianah420. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for R270,20. You're not tied to anything after your purchase.