Invitation to Cybersecurity

Glossary 305 EternalBlue: a Windows vulnerability that was disclosed within a cache of cyber weapons purportedly belonging to the NSA (9) Ethernet: the main Layer 2 protocol used to connect computers to the Internet (2) ethical hacking: hacking while behaving ethically at all times, respecting the rights of all citizens, and obeying all applicable laws and legal authorities (3) Event Viewer: the Windows OS built-in log viewer and manager (8) evil maid attack: an attack where a hacker gains physical access to an unattended computer and compromises it (4) evil twin attack: an attack that tricks users into connecting to a wireless network that is administered by a hacker (9) exclusions: a loss explicitly not covered by the policy (5) Exclusive OR (XOR): a Boolean function that outputs 1 when exactly one of the input bits is 1 and 0 otherwise (7) executable: a compiled program that can be run by the operating system (2) execute: the permission to run a program or script (8) experimental game theory: another name for behavioral game theory (6) exploit: an action that takes advantage of a vulnerability to compromise security (3) exposure: the potential losses that could result from an incident (5) exposure factor (EF): the percentage of the asset’s value that will be compromised if the risk is realized (5) externality: a cost borne by external parties that exceeds the cost borne by the party responsible for causing or preventing it (5) extortion: threatening to carry out a harmful action unless a payment is made (3) false negative alert error: an error that occurs when there is malicious activity but no alerts are generated (8) false negative error: an authentication error that occurs when the right person fails authentication (8) false positive alert error: an alert that turns out to be normal activity (8) false positive error: an authentication error that occurs when the wrong person passes authentication (8) Family Educational and Privacy Rights Act (FERPA): a United States data privacy law that protects student educational records (5) fetch-decode-execute cycle: the process performed by the CPU of fetching a block of memory, decoding it, and then executing it (2) file system: the organization of the files in an OS (8)

RkJQdWJsaXNoZXIy MTM4ODY=