• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back

What is Def Con?

one of the world's largest annual hacker conventions, held every year in Las Vegas, Nevada. The first DEF CON took place in June 1993.

What vehicle was hijacked by two hackers?

Jeep Cherokee

Who were the hackers?

Miller and Valasack

Who recently hired them? Why?

Uber, To consult on the security of self-driving cars

What are the basic hardware operations of a computer?

1) Basic arithmetic - Simple arithmetic operations, such as addition and subtraction.




2)Basic logic - Simple logico-mathematical operations on bit strings, such as and, or, rotate.




3)Data Access - Storage and retrieval of individual data items.




4)Control of execution flow - Operations to effect changes in the sequence of instruction execution.




5)I/O - Input and output operations

What is a rootkit?

a bundle of standard system programs that have been corrupted to secretly serve the hacker.

What role do packets play with the internet?

data on networks is sent in small pieces called packets

What is a packet sniffer?

it captures packets as they pass by and saves them for analysis

What are the pros and cons of packet sniffers?

pro – can be used as basis of IDS


con – can be used to invade privacy

What is Robert Berkowitz’s position on packet sniffers and the Patriot Act?

the no-suspicion-required standard is unconstitutional