Invitation to Cybersecurity

INVITATION TO CYBERSECURITY 310 Internet Service Provider (ISP): a company that provides Internet access to homes and organizations (2) interpreted language: a programming language that is executed by an interpreter (2) interpreter: an execution engine program for interpreted languages (2) intractable problems: computable problems that would take a computer a prohibitively long time to solve (2) intrusion detection and prevention system (IDPS): a program that performs anomaly detection to identify malicious behavior (9) iOS: a mobile OS developed by Apple (2) IP (Internet Protocol): the main Layer 3 protocol used in the Internet (2) IP address: the Layer 3 address for computers on the Internet (2) Jeopardy style CTF: a CTF where competitors earn points by finding flags and solving challenges (3) Jobs, Steve: a phone phreaker as a young person who went on to co-find Apple with Steve Wozniak (3) John the Ripper: a command-line tool for Linux that is used to crack password hashes (4) jus ad bellum: a principle of international law that outlines the conditions for when it is justified for a state to enter into war with another state (10) jus in bello: a principle of international law that outlines acceptable conduct in war (10) just war theory: another name for jus ad bellum (10) Kahn, Bob: a pioneer of the Internet who along with Vint Cerf created the TCP/IP protocols (2) Kali Linux: an open-source OS designed for hacking that is frequently installed on a VM (2) Kantian ethics: an ethical paradigm that emphasizes the motivations behind actions and focuses on duties and obligations (10) Kerckoffs’s principle: a principle of cryptography that states it needs to be assumed that the adversary has access to the underlying cryptosystem (7) kernel: the core low-level component of an OS (2) key: the secret that is input into the encryption and decryption processes (7) key binding problem: the difficulty associated with associating public keys with real-life identities when using public key cryptography (7) key distribution problem: the difficulty associated with securely distributing keys to the communicating parties when using symmetric key cryptography (7) key stretching: a technique for slowing down password cracking attempts by using the last link in a hash chain as the authenticating hash (7)

RkJQdWJsaXNoZXIy MTM4ODY=