Invitation to Cybersecurity

Glossary 317 policies: written guidance that define how actions are to be performed (5) polyalphabetic substitution cipher: a cipher that uses multiple plaintext-to-ciphertext alphabet mappings (7) port number: the Layer 4 address for computer processes (2) post exploitation: the phase of a cyber attack where the hacker has gained access to the target and begins commandeering it (4) post-mortem: a review of an incident after the fact to improve the process going forward (5) Poulsen, Kevin: a hacking folk hero famous for phone phreaking who later because a journalist (3) pre-mortem: a thought experiment where one imagines a failure has occurred and explores how and why it could have happened (9) premium: the cost to purchase the insurance (5) pretexting: a social engineering step that involves creating a believable background story for contacting the target (4) Pretty Good Privacy (PGP): encryption software written by Phil Zimmermann in 1991 to protect digital communications (10) preventative controls: measures taken to prevent a risk from being realized (5) primary domain: the part of the URL that is registered and ties it to a real-life entity (2) principle: a high-level guideline that informs daily priorities and decisions (9) principle of proportionality: a principle that declares if a state suffers harm at the hands of another state, a response out of proportion to the harm inflicted is not justified (10) private key: in public key cryptography the key that is kept private (7) procedure: an encapsulation of a set of programming statements that perform a task (2) process: a running program (2) processing delay: the amount of time it takes a router to receive, process, and resend a packet (2) processor interrupt: a signal sent to the CPU to prompt it to handle a new action (2) product: using multiple cryptographic schemes in sequence (7) prompt injection attack: an attack where malicious prompts are fed into large language models to manipulate their behavior (9) proof of work: a technique used in blockchains for ensuring that computational effort is required to produce a valid block (7) propagation delay: the amount of time it takes a signal to travel a distance (2) proportional allocation strategy: allocating soldiers in the Colonel Blotto game in direct proportion to the values of the battlefields (6)

RkJQdWJsaXNoZXIy MTM4ODY=