click below
click below
Normal Size Small Size show me how
Cyber Security Unit
Term | Definition |
---|---|
Digital Footprint | The trail that you leave behind when you engage in online experiences |
Network Security Cloud Lab | virtual machine or simulated computer that runs on a host computer. |
Crack | To guess or discover information, especially a password. |
Python Script | A collection of Python code or commands that perform some function. |
Brute Force Attacks | An attempt to discover information, especially passwords, through trial and error. Attackers try as many passwords or phrases as possible hoping one of the guesses is correct. |
Dictionary Attack | A systematic attempt to crack a password testing with words and phrases found in online dictionaries. |
Encrypted | A process that converts human-readable text or data into a coded from. It is usually used to protect data from being easily seen or accessed. To encrypt means to do the conversion. |
Algorithm | A set of steps to accomplish a task. |
File extension | The part of the filename that comes after the period, indicating the file type. |
Authorizes | To give permission, for example, in order to access information. |
Authenticate | To confirm your identity using knowledge known only to you or information interpreted by you. |
CAPTCHA | A system that can distinguish between a human and an automated program. |
Social Media | Websites and applications used for communication by large groups of people, enabling them to share information and develop an online social network |
Spam | Irrelevant or inappropriate messaging sent through email to a large number of recipients; also known as junk mail. |
Phshing | Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers. |
Phisher | The person sending the phishing attempts |
Cyberteam | A team of individuals working together to investigate cyber events and anomalies. |
Team Norms | Guidelines that team members develop in order to be followed when working together. |
Network Topology | The arrangement of the various elements (computers, routers, switches, etc) of a network. |
LAN | A small local area network of computers and devices. |
Services | Service can have two meanings in computer terminology: a) A service can be a specific application or function such as email, chat, etc. b) A service can refer to a specific part of an application, such as transmitting the data of a web page |
Vulnerabilities | In cybersecurity terms, a vulnerability is a weakness in a system that allows an attacker to gain unauthorized access. |
Adware | Advertising software that can automatically download files or link to websites. It is often unasked-for and can contain malware. |
Popup | A new dialog box that appears on your screen, sometimes without you requesting it. |
Operating System | Software that supports a computer's basic functioning. Every general purpose computer has an operating system. |
Updated | Enhancements, improvements, and problem fixes for software. |
Firewall | Software that can stop malware from entering a network, computer, or device. |
Server | A computer shared by multiple users across a network. It usually contains resources such as files, computer applications, or large databases. |
Router | A network device that controls and filters data between networks, either wired or wireless. It is a specific type of "gateway", a device that acts as a gate between two networks. |
Protocol | An agreed-upon method for communication. |
Port | A numerical address that a process uses to make itself available to incoming data. |
Web Server | A computer that delivers files forming web pages across a network to requesting clients. |
HTTP | Hyper-text transfer protocol; the rules of communication that web sites use to exchange data. |
Log Files | A file that contains an official record of activities that occur on a computer. |
Antivirus | Software that runs on your computer, looking for many different types of malware from many different sources. |
Encrypt | A process that converts human-readable text or data into a coded from. It is usually used to protect data from being easily seen or accessed. To encrypt means to do the conversion |
Wildcard | A special character that can represents one or more characters. The asterisk (*) wildcard can stand from many letters, numbers, or symbols. |
RAM | Random Access Memory, or RAM, stores data that is in use. |
Environment Variable | A value that can change depending on the environment in which a processes runs. |
URL | The acronym for "Uniform Resource Locator". The systematic way to find specific web addresses and web pages. A URL is composed of characters that contain information about where to locate a resource over the internet. |
Browser Extension | An optional feature of a browser that extends standard browser features. Also called an add-on. |
Cookies | Small text-based bits of information about your browser that a web server saves. |
Incident Response (IR) Report | A documentation tool that describes how an organization detected and handled a specific incident of a data breach or cyberattack. |