A highly skilled computer specialist who seeks to gain unauthorized access to systems without malicious intent.
The hacking of a system to promote or draw attention to a cause.
The process of securing a computer system and decreasing the attack surface.
The process of placing data and a key into a mathematical algorithm to produce a fixed-length value called a hash.
A trap set to detect unauthorized attempts to access a system.