Computer Security: The methods, techniques, and tools used to ensure that a computer system is secure.
Critical Infrastructure: Infrastructure whose loss or impairment would have severe repercussions on society.
Elite Hacker: A hacker who has the skill level necessary to discover and exploit vulnerabilities.
Hacker: A person who performs hacking activities.
Hacking: The term used by the media to refer to the process of gaining unauthorized access to computers systems and networks.
Hacktivist: A hacker who uses their skills for political purposes.
Highly structured threat: A threat that is backed by the time and resources to allow virtually any form of attack.
Information warfare: The use of information security techniques, both offensive and defensive, when combating an opponent.
Script kiddie: A hacker with little true technical skill and hence who uses only scripts that someone else developed.
Structured threat: A threat that has reasonable financial backing and can last for a few days or more. The organizational elements allow for greater time to penetrate and attack a system.
Unstructured threat: A threat that has no significant resources or ability - Typically an individual with limited skill.
Critical Infrastructure: Infrastructure whose loss or impairment would have severe repercussions on society.
Elite Hacker: A hacker who has the skill level necessary to discover and exploit vulnerabilities.
Hacker: A person who performs hacking activities.
Hacking: The term used by the media to refer to the process of gaining unauthorized access to computers systems and networks.
Hacktivist: A hacker who uses their skills for political purposes.
Highly structured threat: A threat that is backed by the time and resources to allow virtually any form of attack.
Information warfare: The use of information security techniques, both offensive and defensive, when combating an opponent.
Script kiddie: A hacker with little true technical skill and hence who uses only scripts that someone else developed.
Structured threat: A threat that has reasonable financial backing and can last for a few days or more. The organizational elements allow for greater time to penetrate and attack a system.
Unstructured threat: A threat that has no significant resources or ability - Typically an individual with limited skill.
Comments
Post a Comment