Invitation to Cybersecurity

Glossary 297 botnet: a collection of “slave” computers that respond to the commands from a “master” computer (4) broken: the state of a cryptographic technique for which attackers can reveal ciphertext messages through cryptanalysis in a shorter amount of time than it would take to perform a bruteforce key search attack (7) Brooks, Frederic: a pioneer of software engineering (2) browser-based application: a program that runs in the cloud that is accessed via a web browser (2) brute-force key search attack: an attack on cryptography that tries every key in the keyspace until it finds the one that unlocks the ciphertext (7) buffer overflow attack: an exploit where the attacker is able to send code to the target computer and force it to execute it (4) bug: a programming mistake (2) bug bounty: a payment made by an organization for finding a vulnerability in one of their products (3) bulletin board system (BBS): online discussion forums that predate the Internet (3) business continuity planning (BCP): ensuring that a business can continue to operate in the wake of a disruption (5) business email compromise: an attack where an employee is tricked into making a fraudulent funds transfer (9) business impact analysis (BIA): a method for determining how a cybersecurity incident will impact the organization (5) Butler, Max (AKA Max Vision): a gray hat hacker who was the subject of the book Kingpin by Kevin Poulsen (3) byte: a group of eight bits (2) C-suite: the topmost leaders of an organization (5) Caesar cipher: a monoalphabetic substitution cipher devised by Julius Caesar that uses a three letter shift of the alphabet for the ciphertext alphabet (7) calling card: a signature deliberately left behind as evidence after a successful cyber attack so the hacker can prove his involvement (3) capture-the-flag (CTF): a hacking contest (3) carders: cybercriminals who sell stolen credit card information (3) catphishing: a social engineering attack where a bad actor creates trust through online interactions and then manipulates victims financially, emotionally, or otherwise (9) caveat emptor: the buyer accepts the risk for a purchase (9) central processing unit (CPU): the unit of a computer that performs all the calculations (2)

RkJQdWJsaXNoZXIy MTM4ODY=