Invitation to Cybersecurity

INVITATION TO CYBERSECURITY 294 Adleman, Leonard: a pioneer of cryptography who along with Adi Shamir and Ron Rivest discovered the RSA cryptosystem (7) administrator access: the highest level of user access available on a Windows OS (8) advanced persistent threats (APTs): a team of elite hackers (3) adversarial thinking: the ability to embody the technological capabilities, the unconventional perspectives, and the strategic reasoning of hackers (6) adversarial thinking (principle): a principle of cybersecurity that states one must never forget about the existence of intelligent human hackers (9) affected parties: all the people who will be impacted by an ethical decision (10) Aleph One: the hacker nick used by Elias Levy, the hacker wrote the famous paper, “Smashing the Stack for Fun and Profit” (3) alert fatigue: the problem of ignoring alerts because of too many false positives (8) algorithm: an abstract, step-by-step recipe for solving a well-defined problem (2) Allen, Paul: a pioneer of computing who along with Bill Gates co-founded Microsoft (2) alphabetic shift cipher: a monoalphabetic substitution cipher that uses a shift of the alphabet for the ciphertext alphabet (7) alteration: modifying or creating data without authorization (4) analytical game theory: another name for traditional game theory (i.e., not behavioral game theory) (6) Android: a mobile OS developed by Google (2) annualized loss expectancy (ALE): the projected losses to a cyber asset due to a cyber risk over the course of a year (5) annualized rate of occurrence (ARO): the expected annual frequency of the incident occurring (5) annualized safeguard costs (ASC): the cost of a safeguard over the course of a year (5) anomaly detection: monitoring the behavior of software looking for unusual or suspicious behavior (9) Anonymous: a notorious international and decentralized hacktivist group (3) antivirus software: a program that scans files to identify malware (9) application firewall: scanning for sensitive information in outbound packets and blocking them from leaving the network (8) application logs: logs that record events associated with programs installed on the OS (8) argument: input into a procedure call (2) Armitage: a GUI wrapper for Metasploit (3)

RkJQdWJsaXNoZXIy MTM4ODY=