Invitation to Cybersecurity

INVITATION TO CYBERSECURITY 324 Target data breach: a supply chain attack against Target that caused a large-scale data breach in 2013 through a contractor trust relationship (4) TCP (Transmission Control Protocol): the main Layer 4 protocol used in the Internet (2) techniques, tactics, and procedures (TTPs): a signature of a certain sequence of steps and types of tools used by a hacker (3) THC Hydra: a hacking tool used for conducting password guessing attacks (4) the cloud: an expression for the computer servers we access online (2) the Colonel Blotto game: a game theoretical game that captures the strategic dynamics of allocating scarce resources as efficiently as possible (6) The Equation Group: an advanced persistent threat that many believe is USCYBERCOM or the NSA (3) the hacker mindset: a mentality of creativity that leads to achieving objectives in unconventional ways (6) the prisoner’s dilemma: a famous game theory game where the players are drawn into to a bad mutual outcome (6) The Social Engineering Toolkit (SET): a hacking tool that provides a step-by-step wizard for configuring and deploying social engineering attacks (3) The Tallinn Manual 2.0: a manual compiled by an international team of experts that attempts to apply international law principles to the cyber domain (10) the traveler’s dilemma: a famous game theory game that illustrates the successive elimination of dominated strategies (6) the triarchic theory: a theory of intelligence devised by Robert Sternberg that divides the intellect into three areas: the analytical, the creative, and the practical (6) third-party governance: oversight imposed on an organization by an outside organization (5) third-party doctrine: when a person shares information with another party, he surrenders his expectation of privacy concerning that information (10) Thompson, Ken: a pioneer of computing who along with Dennis Ritchie created the UNIX operating system (2) time-to-exploit: the time between vulnerability disclosure to exploitation (4) Title 10: the section of the United States Code that covers signals intelligence (10) Title 18: the section of the United States Code that contains most of the laws for which a person can be charged with a federal crime (10) Title 50: the section of the United States Code that covers military activity (10) Top Secret (TS): a United States Department of Defense classification for information that could reasonably be expected to cause exceptionally grave damage if it was disclosed (8)

RkJQdWJsaXNoZXIy MTM4ODY=