The ABC’s of Cybersecurity: K-O
Cybersecurity can seem an intimidating undertaking requiring in-depth knowledge of computers and coding along with a whole new vocabulary to-boot. In this blog series, The ABC’s of Cyber Security, we’ll give you the base-knowledge you need to feel confident in approaching the subject of cyber security. In our age of constant connection, and increasingly storing our valuable information online, it’s important for everyone- even those with non-technical backgrounds- to build an awareness of cyberattacks and have an idea of how to prevent, report, track and mitigate these attacks. You can find A-E here, but without further ado, here are our Cyber Security Vocabulary Basics K- O:
There are two different uses for the term key. 1) A variable value, applied using an algorithm, to produce encrypted text or decrypt encrypted text. 2) A field selected for sorting.
A Key Logger is a useful tool for crackers allowing them to obtain passwords by logging which keys have been pressed on a keyboard. This gives hackers the ability to bypass other security measures.
Any form of authentication information whether physical or electronic.
Granting entities only the minimal requirements/resources to access what they need to perform their official duties.
Licensed Penetration Tester (LPT)
A licensed professional who performs penetration testing on corporate networks to find vulnerabilities which need patching. Take our EC-Council courses to become a LPT yourself!
Encryption of data along a communications path, including routing data.
A malicious software designed to perform unauthorized processes disrupting, damaging, intruding a system/computer, usually covertly.
The processes of lessening the severity of a cyberattack.
Man-in-the-Middle (MitM) Attack
An attack involving a hacker intercepting communication between two devices with the ability to not only capture, but manipulate, sensitive information- in real-time.
An information system with interconnected components such as: routers, cabling, key distribution, etc.
Acting as both a review and target identification/analysis technique, network sniffing is a way of passively monitoring network communication.
Network Vulnerability Scanning
The inspection of potential exploits on a network, in order to identify and security vulnerabilities.
This attack entails a hacker obtaining data to be analyzed on a system of their own choosing.
Consists of any information or data being stored outside of approved containers.
Security controls implemented by people rather than systems.
Many of these terms make instinctual sense with your, already vast, knowledge of the English language. Terminology in cyber security is simply explaining virtual actions, events and objects in a physical way. As you become more accustomed to the various ways in which we discuss networks, systems and cyberattacks- you will find yourself understanding the ABC’s of cybersecurity and empowered to learn how it all works together.