Invitation to Cybersecurity

INVITATION TO CYBERSECURITY 314 network interface card (NIC): the standard I/O device for sending and receiving data over a computer network (2) network latency: the time it takes network traffic to travel from the source to final destination (2) network scanning: sending packets to probe for devices and processes running on the network (4) ng: next generation, often used in software names (3) nibble: a group of four bits (2) nick: an online identity used by a hacker (3) Nmap: a popular Linux-based command-line tool used to perform network scanning (4) no-click attack: an attack that exploits vulnerabilities in smartphones and is triggered by just receiving a text message (4) nodes: computer devices (2) non-computer problems: well-defined problems that are not solvable by computers (2) non-disclosure agreement (NDA): a legal document that binds pentesters to confidentiality (3) non-repudiation: the property of not being able to deny having produced a message (7) nonce: a randomly generated string of bits also known as a “number used once” (7) normal form: a representation of a game that uses rows and columns to capture the essential elements of the game (6) NotPetya: a Russian wiperware virus that targeted Ukraine but caused a massive amount of collateral damage when it occurred in 2017 (4) nslookup: a Windows command line utility for using DNS to resolve domain names to IP addresses (2) nuisance hacking: hacking motivated by curiosity, fun, and bragging rights (3) object: resources in a computer system (8) one-time pad: an information-theoretic secure polyalphabetic substitution cipher that uses a random key of the same length as the message (7) one-time passcode: a randomly generated number that is only used once and has a short expiration that is used as an authentication token (8) one-way property: a feature of hash functions that make it impossible to start with a hash and generate the original data object (7) open source intelligence (OSINT): identifying and collecting information that is available to the public (4) open-source software: software for which the source code is published (9)

RkJQdWJsaXNoZXIy MTM4ODY=