• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/10

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

10 Cards in this Set

  • Front
  • Back

A(n) __________ is a threat characterized by a greater amount of planning, a longer period of time to conduct the activity, more financial backing to accomplish it, and the possible corruption of, or collusion with, insiders.

highly structured threat

A hacker whose activities are motivated by a personal cause or position is known as a __________.

hacktivist

Infrastructures whose loss would have a severe detrimental impact on the nation are called __________.

critical infrastructure

__________ is warfare conducted against the information and information processing equipment used by an adversary.

information warfare

A __________ simply sends a "ping" (an ICMP echo request) to the target machine.

ping sweep

A(n) __________ is a threat that generally is short-term in nature, does not involve a large group of individuals, does not have large financial backing, and does not include collusion with insiders.

unstructured threat

__________ are the most technically competent individuals conducting intrusive activity on the Internet. They not only can exploit known vulnerabilities but are usually the ones responsible for finding those vulnerabilities.

elite hackers

A __________ helps identify which ports are open, thus giving an indication of which services may be running on the targeted machine.

port scan

__________ are individuals who do not have the technical expertise to develop scripts or discover new vulnerabilities in software but who have just enough understanding of computer systems to be able to download and run scripts that others have developed.

script kiddies

A(n) __________ is a threat characterized by attacks that are conducted over short periods of time (lasting at most a few months), that do not involve a large number of individuals, that have little financial backing, and are accomplished by insiders or outsiders who do not seek collusion with insiders.

structured threat