Invitation to Cybersecurity

INVITATION TO CYBERSECURITY 304 Draper, John (AKA Captain Crunch): a hacking fold hero who pioneered phone phreaking (3) drive-by-download: an attack that exploits vulnerabilities in web browsers and is triggered by just visiting a malicious website (4) dropped packet: a packet that never reaches its destination (2) due diligence: a threshold based on what a “prudent man” would do to safeguard an organization (5) dumpster diving: a low-tech recon tactic that involves looking through discarded trash for insider information about the target (4) dwell time: the amount of time that an unauthorized actor remains undetected on a system or network (9) dynamic: a feature of cyberspace where devices and data are continually in flux (1) e-gold: an early online currency that was shut down by law enforcement because of its use in illegal transactions (3) Economic Espionage Act: a United States law that protects the intellectual property of companies (10) Edge: Microsoft’s web browser (2) Electronic Communications Privacy Act (ECPA): a United States law that protects the right to privacy for digital communications (3) elite hackers: people who possess an enormous amount of technical understanding and expertise (3) Elk Cloner virus: one of the first computer viruses and an example of nuisance hacking that displayed a silly poem on the victim’s screen (3) email spoofing attack: an attack where a hacker changes the From: field in an email to make it appear like the email came from someone else (4) encapsulation: the process of grouping functionality into a single simple unit (2) encryption: the process that scrambles plaintext into ciphertext (7) end-user license agreement (EULA): a type of contract that software providers make their end users accept before providing the users access to their services (9) endpoint: the computers, smartphones, and other devices on the network (8) enrollment phase: the part of the authentication process when the user’s access credentials are registered and stored in an authentication database (8) equal error rate: the level of specificity where the fraud rate and the error rate are set equal to one another for a biometric authentication method (8) escalate privileges: increasing access privileges on a device (4)

RkJQdWJsaXNoZXIy MTM4ODY=