INVITATION TO CYBERSECURITY 322 snapshot: a capture of the complete state of a VM at a point in time (2) Sneakers (1992 film): Martin Bishop (Robert Redford) leads a team of pentesters including Darren Roskow (Dan Aykroyd), AKA Mother, who work with the NSA to recover a Russian code-cracking device. (3) social contract theory: an ethical paradigm that emphasizes the preservation of basic human rights (10) social distance: the state of being removed from the feelings of others (1) social engineering: the practice of deceiving people into divulging sensitive information or performing actions that undermine security (4) social responsibility: the proposition that professionals and organizations have an obligation to promote the welfare of society (10) socket programming: programming for communicating over a network (2) software: the instructions that the computer hardware executes (2) software library: a group of related procedures that can be imported into a program (2) software patching: fixing vulnerabilities in software by installing an updated version (4) software reverse engineering: the skill of dissecting an executable program to determine how it works and where it may have vulnerabilities (3) SolarWinds hack: a supply chain attack that compromised many United States government agencies in 2019 through an IT trust relationship (4) solid state drive (SSD): storage in cells that uses no moving parts (2) something you are: a category of authentication token that is based on physical characteristics (8) something you have: a category of authentication token that is based on being in possession of a unique device (8) something you know: a category of authentication token that is based on secret information (8) Sony Pictures hack: a doxxing attack conducted by North Korea in retribution for releasing a comedy film that made fun of them in 2014 (4) source code: a text document that contains a high-level program (2) spam: an unsolicited and unwanted communication (8) spear phishing: a highly targeted phishing attack (9) spoofed website: a fake version of a legitimate website (4) SQL injection: a website attack against that tricks the database server into executing code and queries provided by the attacker (4)
RkJQdWJsaXNoZXIy MTM4ODY=