Invitation to Cybersecurity

INVITATION TO CYBERSECURITY 302 data loss prevention: scan for sensitive and proprietary information in outbound packets and block them from leaving the network (8) data retention: the practice of storing data (9) Debian: a popular Linux distribution known for being stable and efficient (2) decimal: a base ten number system that uses the symbols 0-9 (2) decryption: the process that undoes the ciphertext scrambling to recover the plaintext (7) deductible: the amount owed by the insured party for a covered incident (5) DEF CON: a major hacking conference held every summer in Las Vegas focused on hackers and competitions (3) default gateway: the first hop for all of a computer’s Internet traffic (2) defecting: a game theory strategy of betraying the other player (6) Defender Antivirus: the Windows OS built-in antivirus software (9) Defender Firewall: the Windows OS built-in firewall (8) defending forward: gaining the initiative in cyberspace by persistently engaging adversaries on their own networks (10) defense in depth: a principle of cybersecurity that states security should be implemented in layers (9) delegation: the property of running with the permissions of the initiating user (8) denial: denying authorized users access to their data and computer systems (4) denial of service (DoS) attack: an attack that denies authorized users access to a resource (4) Department of Defense (DOD): the division of the United States government in charge of military and intelligence operations (3) depth wins: a principle of cybersecurity that states the success of cyber attacks and cyber defense often comes down to who knows more (9) desktop application: a program that runs locally on a computer (2) detective controls: measures taken to detect incidents (5) deterministic: the property of producing the same output for the same input every time (7) deterrence: using the threat of retaliation to deter (dissuade) adversaries from attacking (10) deterrent controls: measures taken to discourage cyber threat actors from acting (5) device driver: a low-level program that manages communication between a peripheral device and the CPU (2) dictionary attack: a password hashing attack that draws base words from a wordlist (e.g., a dictionary) and applies string mangling (9)

RkJQdWJsaXNoZXIy MTM4ODY=