Podcast
Questions and Answers
Ethical Hackers (White hat hackers)
Ethical Hackers (White hat hackers)
good hackers, defenders. Works for the benefit of the public.
Grey hat hacker
Grey hat hacker
between the lines of good and bad hacker. Possibly rehabilitated.
Black hat hackers and cyberterrorists
Black hat hackers and cyberterrorists
Black hat hacker: criminals Cyberterrorists: hackers that are terrorists. Destroy targets and cause physical harm (to the person using the target device). Sometimes their actions are not stealthy. Cyberterrorists aim to cause actual physical injury or danger, going beyond just digital damage.
Botnet
Botnet
Signup and view all the answers
Storm botnet
Storm botnet
Signup and view all the answers
Conficker botnet
Conficker botnet
Signup and view all the answers
Mirai botnet
Mirai botnet
Signup and view all the answers
How to put machines into a domain
How to put machines into a domain
Signup and view all the answers
tools and activities used to develop malware
tools and activities used to develop malware
Signup and view all the answers
A Trojan, or Trojan horse
A Trojan, or Trojan horse
Signup and view all the answers
Android malware
Android malware
Signup and view all the answers
Dropper
Dropper
Signup and view all the answers
Payload
Payload
Signup and view all the answers
Ransomware
Ransomware
Signup and view all the answers
Scareware
Scareware
Signup and view all the answers
Ransomware-as-a-Service (RaaS)
Ransomware-as-a-Service (RaaS)
Signup and view all the answers
Hactivism
Hactivism
Signup and view all the answers
Online shaming
Online shaming
Signup and view all the answers
Mass surveillance
Mass surveillance
Signup and view all the answers
mass surveillance(tempora)
mass surveillance(tempora)
Signup and view all the answers
mass surveillance(Muscular)
mass surveillance(Muscular)
Signup and view all the answers
mass surveillance(XKeyscore)
mass surveillance(XKeyscore)
Signup and view all the answers
Identity theft
Identity theft
Signup and view all the answers
Theft of service
Theft of service
Signup and view all the answers
Network intrusion or unauthorized access
Network intrusion or unauthorized access
Signup and view all the answers
Posting and/or transmitting illegal material
Posting and/or transmitting illegal material
Signup and view all the answers
Fraud
Fraud
Signup and view all the answers
Embezzlement
Embezzlement
Signup and view all the answers
Dumpster Diving
Dumpster Diving
Signup and view all the answers
DoS (Denial of Service) /DDoS (Distributed Denial of Service)
DoS (Denial of Service) /DDoS (Distributed Denial of Service)
Signup and view all the answers
Cyberstalking/Cyberbullying
Cyberstalking/Cyberbullying
Signup and view all the answers
Cyberterrorism
Cyberterrorism
Signup and view all the answers