Invitation to Cybersecurity

Glossary 327 von Neumann architecture: the standard model for the hardware components of a computer (2) von Neumann, John: a pioneer of computer architecture (2) VPN (virtual private network): a technology that creates an encrypted channel between an endpoint and a trusted channel for web browsing (9) vulnerability: a weakness (3) vulnerability assessment: a scan for known vulnerabilities on a computer system or network (5) WannaCry: a worldwide ransomware attack that exploited the EternalBlue vulnerability in 2017 and was attributed to the North Korean government by the United States (9) warez: (pronounced “wares” as in goods) pirated software (3) WarGames (1983 ilm): Seattle high schooler David Lightman (Matthew Broderick) impresses his classmate Jennifer Mack (Alley Sheely) by hacking into a computer he believes belongs to a video game company but is actually an AI-driven Department of Defense computer and almost triggers a nuclear war with the Soviet Union (3) warrant: an order signed by a judge giving law enforcement the authority to search and seize evidence (10) watering hole attack: a supply chain attack where a hacker compromises a web server that the target visits to attack the target (4) watermark: a conspicuous marking in the background of a document (8) weakest link: a principle of cybersecurity that states hackers will take the easiest path towards accomplishing their objectives (9) web browser: the main program used to access Internet resources (2) web exploitation: an attack on a website (4) website cloning: creating a copy of a website (4) website defacing: taking over a website and replacing it with a defaced version or a new webpage promoting the hacker (3) while-statement: along with the for-statement, the typical looping statement keyword (2) white hat hackers: individuals who hack legally and ethically (3) whitelist: a list of explicitly approved resources (8) Wikileaks: a website that publishes documents from data leaks (3) Windows: Microsoft’s operating system (2) wiperware: malware that deletes data or causes physical damage to a computer system (4) Wireshark: a free and open-source packet sniffer (2)

RkJQdWJsaXNoZXIy MTM4ODY=