978-0840020932 Chapter 1

subject Type Homework Help
subject Pages 5
subject Words 896
subject Authors Alfred Basta, Nadine Basta, PhD CISSP CISA Mary Brown

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Chapter 1
True/False
Indicate whether the statement is true or false.
1. Hacking requires that the practitioner be intimately familiar with the techniques of the perpetrator or opponent.
2. The reading and techniques used by both ethical and malicious hackers are identical.
3. Making money is a rare motive among all classes of hacker.
4. Viruses are indiscriminate in their damaging effects, but only expert hackers can set one loose.
5. The protection of data provided to organizations or stored on personal computers is a high priority.
Multiple Choice
Identify the choice that best completes the statement or answers the question.
1. The ____ model is derived from old Western genre movies where the “good guys” always wore white hats and the “bad
guys” always wore black hats.
a.
White Hat/Black Hat
c.
White Protector/Black Demon
b.
White Box/Black Box
d.
White Spy/Black Spy
2. “____” hackers are evidence that the dichotomy of good and evil is NOT a very good fit to the real world.
a.
Gray Spy
c.
Gray Hat
b.
Gray Box
d.
Gray Service
3. ____ hackers have limited computer and programming skills, and rely on toolkits to conduct their attacks.
a.
Cyber-punk
c.
Old guard
b.
Coder
d.
Novice
4. ____ hackers act as mentors to new hackers. They write scripts and tools that others use.
a.
Old guard
c.
Hacktivists
page-pf2
b.
Coders
d.
Internal
5. The profession of ____ is emerging from a chaotic set of conflicting ethics from both the hobbyist and student
communities and those on the information technology career track.
a.
network analysis
c.
network security
b.
security response
d.
network response
Completion
Complete each statement.
1. Computer ____________________ is the term for illegally hacking into a computer system without the permission of
the system’s owner.
2. ____________________ are the principles of conduct that govern individuals, groups, and professions.
3. The first password hacks were a response to the ___________________________________, developed in the early
1960s and first loaded on an IBM mainframe at MIT.
4. In the 1970s, phone phreaks, a new sort of hacker, appeared. They used various methods, collectively called
____________________, to access telephone networks to make free calls from payphones.
5. A(n) ____________________ is a security professional who applies his or her hacking skills for defensive purposes.
page-pf3
1. How are hackers commonly categorized?
2. What are some of the hackers’ motivations?
3. Explain “love for puzzles” as a motivation for hackers.
4. What is the problem with using bandwidth without permission?
5. What are the issues with copying, downloading, and using proprietary software and other copyrighted works?
page-pf4

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.