Invitation to Cybersecurity

INVITATION TO CYBERSECURITY 312 lossless: a transformation process where none of the original information is lost and is recoverable, like in cryptography (7) lossy: a transformation process where original information is lost and is unrecoverable, like in hashing (7) Lovelace, Ada: the world’s first computer programmer who worked with Charles Babbage on the Analytical Engine (2) low-water mark principle: a principle of access control that states the lowest level of information that a subject is exposed to sets the bar (8) LSB RGB steganography: an image steganography technique that encodes secret message bits in the least significant bits of the pixel colors (7) MAC (Media Access Control) address: the Layer 2 address for NICs (2) machine code: instructions that a CPU can execute (2) macOS: Apple’s operating system (2) MafiaBoy: the hacker nick used by Michael Calce, as a fifteen year old he made national headlines for taking down yahoo.com (3) malware: malicious software used in cyber attacks (4) malware signature: a specific sequence of 1s and 0s in known malware (9) man-in-the-middle attack: an attack where an adversary undetectably intercepts communications between a communicating parties (7) mandatory access control (MAC): an access control model where permissions are managed exclusively by administrators (8) MasterSplyntr: the hacker nick used by an FBI agent to infiltrate a cybercriminal network (3) maximum allowable downtime (MAD): the maximum amount of time an asset can be unavailable before the organization is severely impacted (5) MD5 (Message Digest 5): a 128 bit hash function created in 1991 that has not been recommended for use since 1996 but is still used in CTFs (7) megabyte (MB): 2^20 bytes (approximately a million) (2) memory: volatile data storage where the CPU access instructions and data (2) metadata: the attributes of an item of data (9) Metasploit: a hacking tool that enables users to pair exploits with payloads and configure them for specific target machines (3) Metcalfe, Robert: a pioneer of the Internet who created the Ethernet protocol (2) Microsoft Security Bulletin: a notice of vulnerabilities discovered in Microsoft software (9) Mimikatz: a hacking tool that extracts plaintext passwords from a computer’s memory (3)

RkJQdWJsaXNoZXIy MTM4ODY=