Invitation to Cybersecurity

INVITATION TO CYBERSECURITY 328 wiretap: a device that can be attached to the telecommunications infrastructure to secretly listen to phone calls (10) Wiretap Act: a United States law that restricts the government’s ability to monitor electronic communications while they are in transit (10) word size: the number of bits that can be processed at a time by the CPU (2) world wide web (the Web): the Internet resources hosted on web servers and accessible via web browsers (2) worldview: a person’s beliefs about ultimate reality (10) worm: a type of computer virus that is programmed to propagate on its own (4) Wozniak, Steve: a phone phreaker as a young person who went on to co-find Apple with Steve Jobs (3) wrapper program: software that binds two different programs together and is useful for creating trojan horse malware (4) write: the modify permission (8) www: the most common subdomain and stands for world wide web (2) XProtect: the macOS built-in antivirus software (9) zero day: an exploit that targets a zero-day vulnerability (4) zero trust: a security strategy that assumes internal systems may be compromised (9) zero-day vulnerability: an unknown and unpatched vulnerability (4) Zimmermann, Phil: a cult hero of computer cryptography who published encryption software on the Internet in defiance of the Arms Export Control Act (10) Zuckerberg, Mark: a pioneer of social media and the founder of Facebook (now Meta) (9)

RkJQdWJsaXNoZXIy MTM4ODY=