Glossary 311 keys to the kingdom dilemma: it is convenient for users to have fewer keys, but if those keys open more doors, then they become bigger targets and do more damage if compromised (8) keyspace: the number of possible keys (7) keystream: a sequence of characters used to encrypt and decrypt messages on a per character basis (7) keystroke logging (keylogging): a technique for stealing passwords by recording the keys typed into a machine (4) keyword: a reserved word in the programming language with a predefined meaning (2) kill chain: the chain of events leading up to a successful attack (4) kilobyte (KB): 2^10 bytes (approximately a thousand) (2) Known Exploited Vulnerabilities (KEV): a catalog of CVEs that have been exploited by threat actors (9) Knuth, Donald: a pioneer of algorithmic analysis (2) L0pht: a pioneering group of cybersecurity researchers (3) LAND (local area network denial) attack: an early computer network attack that crashed victim computers by sending them a packet with a source IP address that matched the destination system’s IP address (5) least privilege: a principle of cybersecurity that states permissions should be granted only up to the level needed and only for as long as necessary (9) leet speak (1337): a system of character substitutions in writing that is popular in hacking culture (3) level: the attribute in a log that records the importance of the event (8) level-k reasoning: the process of iteratively thinking about what the other player might do and how to best respond (6) Lightweight Directory Access Protocol (LDAP): a protocol used to securely send authentication tokens over a network (8) limit of liability: the maximum amount the insurance company will pay in case of a loss (5) links: a direct connection between nodes (2) Linux: a free and open-source operating system developed by Linus Torvalds (2) log analysis: a review of system and network logs to identify malicious activity (5) logging: recording cyberspace events (8) logic bomb attack: an attack where a hacker plants malware and sets it to “detonate” at a later date (4) looping statements: statements that define a repeated path of execution (2)
RkJQdWJsaXNoZXIy MTM4ODY=