click below
click below
Normal Size Small Size show me how
Cyber Security Unit
| Term | Definition |
|---|---|
| Digital Footprint | The trail that you leave behind when you engage in online experiences |
| Network Security Cloud Lab | virtual machine or simulated computer that runs on a host computer. |
| Crack | To guess or discover information, especially a password. |
| Python Script | A collection of Python code or commands that perform some function. |
| Brute Force Attacks | An attempt to discover information, especially passwords, through trial and error. Attackers try as many passwords or phrases as possible hoping one of the guesses is correct. |
| Dictionary Attack | A systematic attempt to crack a password testing with words and phrases found in online dictionaries. |
| Encrypted | A process that converts human-readable text or data into a coded from. It is usually used to protect data from being easily seen or accessed. To encrypt means to do the conversion. |
| Algorithm | A set of steps to accomplish a task. |
| File extension | The part of the filename that comes after the period, indicating the file type. |
| Authorizes | To give permission, for example, in order to access information. |
| Authenticate | To confirm your identity using knowledge known only to you or information interpreted by you. |
| CAPTCHA | A system that can distinguish between a human and an automated program. |
| Social Media | Websites and applications used for communication by large groups of people, enabling them to share information and develop an online social network |
| Spam | Irrelevant or inappropriate messaging sent through email to a large number of recipients; also known as junk mail. |
| Phshing | Practice of sending fraudulent emails that appear to be from legitimate companies with the intent to induce people to share sensitive information, such as passwords and credit card numbers. |
| Phisher | The person sending the phishing attempts |
| Cyberteam | A team of individuals working together to investigate cyber events and anomalies. |
| Team Norms | Guidelines that team members develop in order to be followed when working together. |
| Network Topology | The arrangement of the various elements (computers, routers, switches, etc) of a network. |
| LAN | A small local area network of computers and devices. |
| Services | Service can have two meanings in computer terminology: a) A service can be a specific application or function such as email, chat, etc. b) A service can refer to a specific part of an application, such as transmitting the data of a web page |
| Vulnerabilities | In cybersecurity terms, a vulnerability is a weakness in a system that allows an attacker to gain unauthorized access. |
| Adware | Advertising software that can automatically download files or link to websites. It is often unasked-for and can contain malware. |
| Popup | A new dialog box that appears on your screen, sometimes without you requesting it. |
| Operating System | Software that supports a computer's basic functioning. Every general purpose computer has an operating system. |
| Updated | Enhancements, improvements, and problem fixes for software. |
| Firewall | Software that can stop malware from entering a network, computer, or device. |
| Server | A computer shared by multiple users across a network. It usually contains resources such as files, computer applications, or large databases. |
| Router | A network device that controls and filters data between networks, either wired or wireless. It is a specific type of "gateway", a device that acts as a gate between two networks. |
| Protocol | An agreed-upon method for communication. |
| Port | A numerical address that a process uses to make itself available to incoming data. |
| Web Server | A computer that delivers files forming web pages across a network to requesting clients. |
| HTTP | Hyper-text transfer protocol; the rules of communication that web sites use to exchange data. |
| Log Files | A file that contains an official record of activities that occur on a computer. |
| Antivirus | Software that runs on your computer, looking for many different types of malware from many different sources. |
| Encrypt | A process that converts human-readable text or data into a coded from. It is usually used to protect data from being easily seen or accessed. To encrypt means to do the conversion |
| Wildcard | A special character that can represents one or more characters. The asterisk (*) wildcard can stand from many letters, numbers, or symbols. |
| RAM | Random Access Memory, or RAM, stores data that is in use. |
| Environment Variable | A value that can change depending on the environment in which a processes runs. |
| URL | The acronym for "Uniform Resource Locator". The systematic way to find specific web addresses and web pages. A URL is composed of characters that contain information about where to locate a resource over the internet. |
| Browser Extension | An optional feature of a browser that extends standard browser features. Also called an add-on. |
| Cookies | Small text-based bits of information about your browser that a web server saves. |
| Incident Response (IR) Report | A documentation tool that describes how an organization detected and handled a specific incident of a data breach or cyberattack. |