Invitation to Cybersecurity

Glossary 325 top-level domain (TLD): the final part of the domain name that separates URLs into high-level categories (2) Torvalds, Linus: the original and primary developer of the Linux OS (2) traceroute: a command line utility that shows the hops to a destination on the Internet (implemented as tracert in Windows) (2) tracking cookies: a text string assigned to a web browser by a web server for the purposes of uniquely identifying a user (9) trade secret: confidential corporate data that the company has taken measures to protect and that has economic value (10) transferring risk: passing the risk to another organization (5) transistor: a device that can control the flow of electricity (2) transposition: a cryptographic technique where letters or words are rearranged (7) trigram: a triplet of letters (7) trojan: trojan horse program (3) trojan horse malware: malware that appears to be and functions like a normal program, but it comes bundled with malware that creates a backdoor into the victim’s machine (4) trusting trust: a principle of cybersecurity that states trust relationships should be explicitly identified and examined so that they can be managed appropriately (9) TS/SCI (sensitive compartmented information): a United States Department of Defense clearance that provides TS subjects with access to more categories of sensitive information (9) Turing Award: the “Nobel Prize” of computer science (4) Turing, Alan: a pioneer of computer science (2) two-factor authentication: MFA when exactly two tokens are used (8) Ubuntu: a popular Linux distribution known for being user-friendly (2) Unclassified (U): a United States Department of Defense classification for information that would pose no risk if it was disclosed (8) Unified Combatant Command (UCC): a division of the United States Department of Defense with broad, continuing missions and coordinate military activity either by geography or by specialty domain area (3) uniform resource locator (URL): a unique name for a resource on the world wide web (2) United Nations Charter: an international treaty signed in 1945 in the immediate aftermath of World War II (10) United States Computer Emergency Readiness Team (US-CERT): a United States department devoted to protecting the nation’s Internet infrastructure by coordinating defense against and response to cyber attacks (5)

RkJQdWJsaXNoZXIy MTM4ODY=