• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/7

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

7 Cards in this Set

  • Front
  • Back
phone phreaking
manipulating telephone system
social engineering
a method used by hackers to fool people into disclosing their passwords
Hacktivism
the use of hacking to promote a political cause
Computer Fraud and Abuse Act (CFAA)
Passed in 1984 is the main federal computer crime law
illegal to access a computer without authorization or to extend one's authorization. This includes altering, damaging or destroying info and also cover DDOS and computer viruses.
USA Patriot Act
expanded CFAA and definition of loss to include the cost of responding to a hacking attack, assessing damage, and restoring systems
honey pots
websites that look attractive to hackers set up by security specialists
computer/digital forensics
field of collecting evidence from computer files