SEARCH
You are in browse mode. You must login to use MEMORY

   Log in to start

level: Level 1

Questions and Answers List

level questions: Level 1

QuestionAnswer
RAM scraping or storage scanning software: malicious code that scans for sensitive data
Data harvesters: cyber criminals who infiltrate systems and collect data for illegal resale
Cash-out fraudsters: criminals that purchase assets from data harvesters to be used for illegal financial gain. They might buy goods with stolen credit cards or create false accounts
Botnets: Surreptitiously infiltrated computers
DDoS Distributed denial of security attacks: shutting down websites with a crushing load of seemingly legitimate requests
Hackers: someone who breaks into computer systems
White hat hackers: Uncover computer weaknesses without exploiting them.
Black hat hackers: computer criminals who exploit a system's weakness for personal gain.
Hactivists: infiltrate a system and exposing information as a protest seeking to make a political point
Griefers or Trolls: malicious pranksters
Bad Apples: rogue employees who steal secrets, install malware, or hold a firm hostage
Social engineering: con games that trick employees into revealing information or performing other tasks that comprise a firm
Phishing: cons executed technology in order to: acquire sensitive information, trick someone into installing malicious software
Spoofed: emails transmissions
Zero-Day Exploits: new attacks that haven't been clearly identified and haven't' been incorporated into security screening systems
Malware: seeks to comprise a computing systems without permission
Viruses: infect other software or files
Worms: take advantages of security vulnerability to automatically spread
Trojans: attempt to sneak in by masquerading as something they're not.
Botnets or Zombie networks: used in click fraud in sending spam to decipher accounts that use CAPTHAS
CAPTHAS: scrambled character images to thwart automated account setup or ticket buying attempts
Screen capture: records pixels that appear on a users screen to identify proprietary information