INVITATION TO CYBERSECURITY 326 United States Cyber Command (USCYBERCOM): the unified combatant command that coordinates cyber-related activities (3) United States v. Chung: a case of foreign espionage where a Boeing engineer was convicted under the Economic Espionage Act for providing trade secrets to China (10) United States v. Drew: a case of cyberbullying where Lori Drew was charged with violating the CFAA but was acquitted because the law did not fit the crime (10) United States v. Morris: a case of nuisance hacking where Robert Tappan Morris became the first person convicted under the CFAA for the Morris Worm in 1990 (10) UNIX: one of the most influential operating systems ever created (2) use of force: a threshold in international conflict that can trigger a justified retaliatory response (10) utilitarianism: an ethical paradigm that emphasizes the consequences of actions and focuses on benefits and harms (10) utility preferences: an ordering of the outcomes from least to most desirable (6) variable: a placeholder for data that is provided when the program is run (2) veil of ignorance principle: a thought experiment where a person reasons about the appropriate action to take while pretending to not know to which of the affected parties he belongs (10) Venona project: a United States counterintelligence operation that collected and analyzed Soviet Union nuclear espionage correspondence (7) Vernam, Gilbert: a pioneer of cryptography that operationalized the one-time pad cryptographic scheme (7) Vigenère cipher: a polyalphabetic substitution cipher that uses a two-dimensional alphabetic table and a codeword to select the ciphertext alphabets (7) vigilante justice: situations where individuals without the proper authority attempt to enforce the law (10) virtual machine (VM): an OS that runs as a program on top of a computer’s actual OS (2) virtue ethics: an ethical paradigm that emphasizes living a life of moral excellence and focuses on character (10) virus: a generic term for malware that infects victim machines and is capable of spreading (4) virus scan: a software-based inspection of a computer to detect if it has been infected with malware (5) VM pod: multiple VMs networked together and isolated from the Internet in a sandboxed computer network (2) VOIP (voice over Internet Protocol): a technology that carries phone call traffic over computer networks (10) volatile: loses its value when the power is off (as in volatile and non-volatile memory) (2)
RkJQdWJsaXNoZXIy MTM4ODY=