Invitation to Cybersecurity

INVITATION TO CYBERSECURITY 318 protocol: a specification for communicating over a network (2) pseudo one-time pad: a one-time pad (or keystream) produced by a deterministic algorithm and is therefore not truly random (7) pseudo-random number generator (PRNG): a deterministic algorithm that generates a stream of numbers that appear random (8) public key: in public key cryptography the key that is made public (7) public key certificate: a signed message tying a real-life identity to a public key (7) public key cryptography: a cryptographic system that uses different keys for encryption and decryption (7) public key infrastructure (PKI): a trust hierarchy that uses signed certificates to bind keys to real-life identities (7) pwn: taking over a victim’s computer through hacking (3) qualitative risk assessment: an approach to analyzing risk severity based on coarse-grained categories (5) quantitative risk assessment: an approach to analyzing risk severity based on fine-grained numerical values (5) quantum computing: a paradigm of computation based on qubits (2) quantum mechanics: the behavior of atoms and subatomic particles (2) quantum superposition: the ability to contain a range of values simultaneously (2) qubit: quantum bit (2) raising awareness: small actions taken to regularly expose employees to cybersecurity threats and best practices (5) RAM (random access memory): memory that can be access directly and in any order (2) ransomware: malware that encrypts data on a victim’s computer and demands a ransom in exchange for the decryption key (4) read: the view permission (8) read-only: a permission that allows viewing but not modifying access (8) reasonable expectation of privacy: a guideline developed by the courts to determine whether the right to privacy applies (10) recognition phase: the part of the authentication process when the user’s identity is validated (8) reconnaissance (recon): the first phase in a cyber attack where the hacker obtains information about the target (4) red team: the attackers in a CTF (3) registers: a type of extremely fast memory that act as a scratchpad for CPU calculations (2)

RkJQdWJsaXNoZXIy MTM4ODY=