Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
7 Cards in this Set
- Front
- Back
phone phreaking
|
manipulating telephone system
|
|
social engineering
|
a method used by hackers to fool people into disclosing their passwords
|
|
Hacktivism
|
the use of hacking to promote a political cause
|
|
Computer Fraud and Abuse Act (CFAA)
|
Passed in 1984 is the main federal computer crime law
illegal to access a computer without authorization or to extend one's authorization. This includes altering, damaging or destroying info and also cover DDOS and computer viruses. |
|
USA Patriot Act
|
expanded CFAA and definition of loss to include the cost of responding to a hacking attack, assessing damage, and restoring systems
|
|
honey pots
|
websites that look attractive to hackers set up by security specialists
|
|
computer/digital forensics
|
field of collecting evidence from computer files
|