CHAPTER 9

image

H

hack attack map: A web site that shows where cyber-attacks are coming from and who is being attacked, in real time. A good example is map.ipviking.com. Also called a cyber-threat map.

hackback: Vigilante attempt to retaliate after a hacker attacks your system. Definitely still illegal, even if you know for sure who is responsible.

HackRF: A software defined radio. Similar to BladeRF and USDR. See Universal Software Radio Peripheral (USRP).

hacker: Unauthorized user who attempts to or gains access to an information system. SOURCE: CNSSI-4009 Also written as hax0r. The hacker can be any one of the following:

  • Loner: Single individual, ...

Get Cybersecurity Lexicon now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.