Glossary “‘What’s the use of their having names,’ the Gnat said, ‘if they won’t answer to them?’ ‘No use to them,’ said Alice; ‘but it’s useful to the people who name them, I suppose. If not, why do things have names at all?’” - Through the Looking-Glass by Lewis Carroll To know something is to name something. This textbook highlights numerous names, or vocabulary words, that are important terms and concepts in the field of cybersecurity. Understanding these terms and using them in their proper context is what makes you a cybersecurity insider. These definitions are the author’s own. The number in parenthesis after the definition is the chapter where the term is defined. 0b: binary number prefix (2) 0x: hexadecimal number prefix (2) 2600 Hz: the tone that triggered operator mode when whistled into a phone (3) 2600: The Hacker Quarterly: a hacker periodical whose name comes from 2600 Hz (3) 32-bit architecture: a computer with a word size of 32 bits (2) 64-bit architecture: a computer with a word size of 64 bits (2) A Secret History of Hacking: a Discovery Channel documentary that highlights the folk heroes of hacking (3) AAA: the three components of access control: authentication, authorization, and accounting (8) abstraction: a high-level summary that retains the essential elements (2) accepting risk: a deliberate decision to live with a risk (5) access control: monitoring and controlling access to computer systems and data (8) access control list (ACL): the set of user permissions associated with an object (8) accounting: recording who did what when (8) actions on objectives: the last phase of a cyber attack where the hacker accomplishes his goals on the target (4) Active Directory (AD): a Microsoft application that provides IAM and other access control services (8) additive: using substitution and transposition together in some proportion in a cryptographic scheme (7)
RkJQdWJsaXNoZXIy MTM4ODY=