INVITATION TO CYBERSECURITY 300 covert channel: a hidden communication path (4) crash: the abrupt termination of a running program (2) credential stealing: fraudulently obtaining a valid set of user credentials to computer systems and data (4) credential stuffing: an attack where a hacker attempts to login to many different websites using a known valid username and password pair (4) criminal hacking: hacking motivated by making money (3) critical: a log level that indicates an event that needs to be reviewed (8) cross-site request forgery (CSRF): a website attack that tricks the target’s web browser into making a website request crafted by the attacker (4) cross-site scripting (XSS): a website attack that tricks the JavaScript engine into executing code provided by the attacker (4) cryptanalysis: the art and science of decrypting ciphertext when not in possession of the secret key (7) crypto wars: a period in the 1980s and 1990s when the United States government tried to restrict the use of strong cryptography to protect digital communications (10) cryptographic backdoor: a mechanism that would allow messages that were encrypted with a cryptosystem to be decrypted by law enforcement under the proper legal authority (10) cryptographic hashing: a form of cryptography that creates digital fingerprints for a data object (7) cryptography: the art and science of scrambling and unscrambling information using a secret to keep it private (7) cryptosystem: all the components needed to implement a specific type of computer cryptography (7) Cult of the Dead Cow (cDc): a pioneering United States hacktivist group (3) cyber 9/11: the potential for a large-scale cyber attack motivated by terrorism (3) cyber assets: computer systems and data of value (5) cyber for AI: using AI to enhance cybersecurity (2) cyber forensics: the process of collecting, analyzing, and preserving cyberspace evidence (3) cyber insurance: a way to transfer cyber risk to an insurance company (5) cyber operations: intelligence and military operations that take place in and through cyberspace (3) cyber Pearl Harbor: the potential for a large-scale cyber attack carried out by an enemy nation state (3) cyber range: a safe online space for practicing cybersecurity (2)
RkJQdWJsaXNoZXIy MTM4ODY=