ISDS 705 Chapter 13
🇬🇧
In Inglés
In Inglés
Practique preguntas conocidas
Manténgase al día con sus preguntas pendientes
Completa 5 preguntas para habilitar la práctica
Exámenes
Examen: pon a prueba tus habilidades
Pon a prueba tus habilidades en el modo de examen
Aprenda nuevas preguntas
Modos dinámicos
InteligenteMezcla inteligente de todos los modos
PersonalizadoUtilice la configuración para ponderar los modos dinámicos
Modo manual [beta]
El propietario del curso no ha habilitado el modo manual
Modos específicos
Aprende con fichas
elección múltipleModo de elección múltiple
Expresión oralResponde con voz
EscrituraModo de solo escritura
ISDS 705 Chapter 13 - Marcador
ISDS 705 Chapter 13 - Detalles
Niveles:
Preguntas:
22 preguntas
🇬🇧 | 🇬🇧 |
RAM scraping or storage scanning software: | Malicious code that scans for sensitive data |
Data harvesters: | Cyber criminals who infiltrate systems and collect data for illegal resale |
Cash-out fraudsters: | Criminals that purchase assets from data harvesters to be used for illegal financial gain. They might buy goods with stolen credit cards or create false accounts |
Botnets: | Surreptitiously infiltrated computers |
DDoS Distributed denial of security attacks: | Shutting down websites with a crushing load of seemingly legitimate requests |
Hackers: | Someone who breaks into computer systems |
White hat hackers: | Uncover computer weaknesses without exploiting them. |
Black hat hackers: | Computer criminals who exploit a system's weakness for personal gain. |
Hactivists: | Infiltrate a system and exposing information as a protest seeking to make a political point |
Griefers or Trolls: | Malicious pranksters |
Bad Apples: | Rogue employees who steal secrets, install malware, or hold a firm hostage |
Social engineering: | Con games that trick employees into revealing information or performing other tasks that comprise a firm |
Phishing: | Cons executed technology in order to: acquire sensitive information, trick someone into installing malicious software |
Spoofed: | Emails transmissions |
Zero-Day Exploits: | New attacks that haven't been clearly identified and haven't' been incorporated into security screening systems |
Malware: | Seeks to comprise a computing systems without permission |
Viruses: | Infect other software or files |
Worms: | Take advantages of security vulnerability to automatically spread |
Trojans: | Attempt to sneak in by masquerading as something they're not. |
Botnets or Zombie networks: | Used in click fraud in sending spam to decipher accounts that use CAPTHAS |
CAPTHAS: | Scrambled character images to thwart automated account setup or ticket buying attempts |
Screen capture: | Records pixels that appear on a users screen to identify proprietary information |