Please enable JavaScript.
Coggle requires JavaScript to display documents.
Definitions (Hackers types (Expert hacker: A hacker who uses extensive…
Definitions
Hackers types
Expert hacker: A hacker who uses extensive knowledge of computer hardware and software to gain unauthorized access to systems and information. Also known as elite hackers, expert hackers often create automated exploits, scripts, and tools used by other hackers.
-
Novice hacker or neophyte or n00b, or newbie:unskilled hacker who uses the work of expert hackers to perform attacks.
- This category of hackers includes script kiddies and packet monkeys.
-
Script kiddie or skids or skiddies or script bunnies. : A hacker of limited skill who uses expertly written software to attack a system.
Professional hacker: A hacker who conducts attacks for personal financial benefit or for a crime organization or foreign government. Not to be confused with a penetration tester.
measuring
Mean time to failure (MTTF): The average amount of time until the next hardware failure. (the expected time to failure)
Mean time to diagnose (MTTD): The average amount of time a computer repair technician needs to determine the cause of a failure
Mean time between failure (MTBF): The average amount of time between hardware failures, calculated as the total amount of operation time for a specified number of units divided by the total number of failures. measure the HW efficiency
Mean time to repair (MTTR): The average amount of time a computer repair technician needs to resolve the cause of a failure through replacement or repair of a faulty unit.
Ask for money
Information extortion or cyberextortion: The act of an attacker who steals information from a computer system and demands for money to return it or for an agreement not to disclose the information.
Ransomware: A form of information extortion where the victim’s data is encrypted by malware and the victim is offered the return of their data only if they pay the attacker.
iOS
Jailbreaking : Escalating privileges to gain administrator-level control over a smartphone operating system (typically associated with Apple iOS smartphones).
Rooting: Escalating privileges to gain administrator-level control over a computer system (including smartphones). Typically associated with Android OS smartphones.
Man-in-the-middle: A group of attacks whereby a person intercepts a communications stream and inserts himself in the conversation to convince each of the legitimate parties that the attacker is the other communications partner.
Networks
Network sniffer or Packet sniffer: A software program or hardware appliance that can intercept, copy, and interpret network traffi
-
TCP hijacking or Session hijacking: A form of man-in-the-middle attack whereby the attacker inserts himself into TCP/IP-based communications.
Spoofing: A technique for gaining unauthorized access to computers using a modified source IP address to give the perception that messages are coming from a trusted host.
Domain Name System (DNS) cache poisoning or DNS spoofing: The intentional hacking and modification of a DNS database to redirect legitimate traffic to illegitimate Internet locations.
Pharming: The redirection of legitimate user Web traffic to illegitimate Web sites with the intent to collect personal information.