Glossary 323 SQL Slammer Worm: a worm that infected seventy-five thousand computers in less than ten minutes in 2003 (4) SSID (service set identifier): the name of a wireless network that users see when they perform a wireless network scan (9) state (politics): a sovereign nation (10) state actors: people acting under the authority of the government (10) stateful firewall: a type of firewall that maintains a memory of inbound and outbound packets for a window of time and uses that context to determine a packet’s fate (8) stateless: the property of not retaining information about previous interactions (8) steganography (stego): the art and science of hiding information in plain sight (4) storage: non-volatile disk space for storing programs and data (2) Stored Communications Act (SCA): a United States law that restricts the government’s access to stored communications such as email and cloud content (10) stream cipher: a cryptographic system that uses a keystream and the XOR function to encrypt and decrypt on a per bit basis (7) string mangling: modifying base words in formulaic ways by changing capitalization, using character substitutions, and adding prefixes and postfixes (9) Stuxnet : a cyber attack against an Iranian nuclear enrichment facility in 2010 (4) subject: actors in a computer system (8) successive elimination of dominated strategies: removing dominated strategies iteratively as choices are eliminated (6) sudo: a command in Linux OSs that allow a user to run a command as another user (9) supply chain attack: an attack where hackers first compromise a supplier of their target in order to get access to their target (4) surreptitious account access: logging into another person’s account to spy on them (8) symmetric key cryptography: a cryptographic system that uses the same key for encryption and decryption (7) syntax: the rules for writing a program in a given language (2) system calls (syscalls): OS-defined procedures that allow user programs to exercise some control over OS functionality (2) system logs: logs that record actions taken by the OS and issues related to the operating system (8) system users: non-human users that can take actions in a computer system (8) Tallinn: the capital city of Estonia and location of the world’s first nation state cyber attack in 2007 (10)
RkJQdWJsaXNoZXIy MTM4ODY=