INVITATION TO CYBERSECURITY 306 Firefox: Mozilla’s web browser (2) firewall: a software application or hardware appliance that allows or denies network traffic based on a set of rules (5) five domains of warfare: land, air, sea, outer space, and cyberspace (3) five Ds: disrupting, degrading, denying, destroying, and deceiving our adversary’s capabilities in and through cyberspace (3) five layer model: the design of the Internet to coordinate communication (2) floating point numbers: the way computers represent base ten numbers with decimal points (2) floppy disks: an old form of removable media used for storage (2) follow the leader: choosing the same cybersecurity solutions that a peer organization in the same sector uses (5) for-statement: along with the while-statement, the typical looping statement keyword (2) foreign espionage: spying conducted by a foreign nation (10) Foreign Intelligence Surveillance Act (FISA): a United States law that allows the government to collect foreign intelligence signals on domestic soil under specific circumstances (3) forward search attack: an attack against a hash to reveal the string it represents by generating putative strings, hashing them, and comparing the outputs to the hash (7) fraud rate: the probability of false positives for a biometric authentication method (8) free and open-source software (FOSS): software that is free to use and whose source code is publicly available (3) full disk encryption: a technology that stores data in encrypted form and decrypts and encrypts it transparently as needed (9) fully qualified: the full directory path is provided (8) gaining unauthorized access: the phase of a cyber attack where the hacker exploits a vulnerability to gain access to the target (4) game: a strategic contest (6) game theory: the study of interdependent decision making between multiple players where each player strives to maximize his own utility (6) garbage data: data in memory that holds outdated or random values (2) Gates, Bill: a pioneer of computing who along with Paul Allen co-founded Microsoft (2) generative AI: computer technology capable of generating coherent media such as text, audio, images, and video (2) genesis block: the first block in a blockchain (7)
RkJQdWJsaXNoZXIy MTM4ODY=