Invitation to Cybersecurity

INVITATION TO CYBERSECURITY 316 penetration testing (pentesting): the active probing of the cybersecurity defenses of an organization for the purpose of improving security (3) pentest report: the deliverable from a pentest describing findings and recommendations (3) people, processes, technology, and facilities: the functional underpinnings of any organization (5) peripheral devices: outside devices that are plugged into a computer (2) permission memo: a legal document that explicitly grants pentesters permission to hack an organization (3) permissions matrix: a two-dimensional table that captures the permissions that subjects can take on objects (8) persistence: the ability to retain access to the compromised device (4) persistent engagement: a strategic approach to cyber operations adopted by the United States in 2018 that is characterized by defending forward (10) personal identification number (PIN): a short easy-to-remember password that is typically used as a second authentication token (8) personally identifiable information (PII): data that can be used to identify a person and commit identity theft (3) phishing emails: a type of social engineering over email (4) phone phreakers: individuals who engaged in phone phreaking (3) phone phreaking: an early form of nuisance hacking that exploited vulnerabilities in the landline, and later cellular, telephone system (3) Phrack: a hacker periodical whose name comes from the terms phreak and hack (3) pigpen cipher: a monoalphabetic substitution cipher that uses geometric shapes for the ciphertext alphabet (7) Ping of Death attack: an early computer network attack that crashed victim computers by sending them a single malformed packet (4) pivoting: using access to one device to gain access to another device (4) pixel: a picture element used to illumine computer screens (2) plaintext: the original unencrypted message (7) plaintext block: a block of unencrypted bits (7) planning for failures: a principle of cybersecurity that states organizations must assume that cyber incidents will occur (9) player perfect rationality: the assumption in analytical game theory that players behave perfectly rationally when making choices (6) players: the actors in the game (6)

RkJQdWJsaXNoZXIy MTM4ODY=