Cybersecurity Unit 2 Terminology
Across
- 2. A machine that requests a webpage using a web browser.
- 5. A Wireshark data capture file that contains packet information of network traffic.
- 8. A network interface card is a physical component on a computer or device that provides connectivity to a network.
- 10. In network security, it allows or denies packets based on source and destinations addresses, ports, or protocols.
- 11. The arrangement of the various elements (computers,routers, switches, etc) of a network.
- 13. A (distributed) denial of service attack that targets websites and web servers with the intention of bringing the services they provide to a halt.
- 16. Transmission Control Protocol used to establish and maintain connections over a computer network.
- 17. An agreed-upon method for communication.
- 18. A code that defines every structure on an HTML page, such as text, images, and links. HTML tags begin with the less-than (<) character and end with greater-than (>) .
- 19. An operating system similar in concept to the Windows OS but used more often to host routers and web servers.
- 20. Software that locks your computer or makes it inoperable, requiring you to pay someone to remove it.
- 21. A part of a process or system that is seen by the user and typically provides functionality to the user.
- 22. A small local area network of computers and devices.
- 26. A piece of software or a sequence of commands that takes advantage of a vulnerability in a computer system to cause unexpected behavior to occur.
- 27. A machine that responds to a request received.
- 29. An identifying number for hosts and servers on the internet.
- 30. The buying and selling of goods or services over the internet.
- 33. it helps the reader of the program understand the code, especially when working on code with other people.
- 34. A way for a computer to identify specific programs and manage their activity.
- 39. When hackers can use their knowledge of a web server's directory structure to craft URL addresses and navigate to locations that are unreferenced and unlinked in a website.
- 41. A file that contains an official record of activities that occur on a computer.
- 42. A computer, typically one on a network.
- 43. Preserving the accuracy of information and validating its source.
- 46. A database in which data is organized into collections of similar data, called tables. It uses relationships to define how data in one table can relate to data in another table.
- 49. A computer that delivers files forming web pages across a network to requesting clients.
- 51. Problems, faults, and bugs in the program that are exploitable, allowing attackers access to the computer on which the program is running.
- 54. A starting point for data analysis. It is the initial data set used in later comparisons.
- 55. In a command, they are used to specify different variations, sometimes supplying additional input to the command or requesting different styles of output from the command.
Down
- 1. Ensuring that information resources and services are accessible in a timely manner.
- 2. Keeping sensitive information out of unwanted hands.
- 3. Performing a computer attack to evaluate the security of a
- 4. It can have two meanings in computer terminology:a) it can be a specific application or function such as email, chat, etc. b) it can refer to a specific part of an application, such as transmitting the data of a webpage
- 6. Software that replicates and infects many computers, turning the computer into a "zombie". Zombie devices are remotely controlled by an attacker for malicious purposes.
- 7. The way an organization structures and organizes the information that is required by their employees and/or customers.
- 9. system The hardware and software used to help organize and analyze data.
- 10. Analyze something without interfering or affecting it.
- 12. Refers to the action of watching and analyzing network traffic at the packet level.
- 14. A type of exploit in which the attacker inserts malicious client-side code into webpages to steal data, take control of a computer, run malicious code, or achieve a phishing scam.
- 15. A computer, typically one on a network. It can also be referred to as a machine or a system.
- 23. In terms of computer science, it means to increase a system's security and reduce its vulnerabilities.
- 24. Reverse the encryption process, making the data human-readable again.
- 25. system. The extra digits are represented by the letters a through f, so all digits in hex are 0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f. You can also see hex numbers in all capitals A through F.
- 28. A three-way communication method using SYN (synchronize), SYN-ACK (synchronize=acknowledge), and ACK (acknowledge) to establishing a connection between
- 29. They are best known for developing standards in the computer and electronics industries.
- 31. A human-based attack in which the malicious user intercepts communication between the victim's computer and the internet.
- 32. Data that is stored in a router in table format. It contains addresses of known networks (other routers), ones that have already been discovered and used.
- 35. The Organizationally Unique Identifier is the first half of the MAC address, designating the manufacturer of the network device.
- 36. It is a very common concept in computer science and information technology; it means that a lot of the detail of a system or a process is hidden, allowing the user to focus on the details that are important for the task at hand.
- 37. Transport Layer Security is a security protocol that uses encryption at a lower level of abstraction.
- 38. Software and hardware that track all keyboard clicks, including back spaces, to discover usernames, passwords, credit card numbers, and other sensitive information.
- 40. Software running with elevated privileges to control a computer or to gain access to restricted accounts and data.
- 44. A network device that controls and filters data between networks, either wired or wireless. It is a specific type of "gateway", a device that acts as a gate between two networks.
- 45. A media access control (MAC) addresses is unique numeric code that is assigned to networking hardware components (typically a network interface card or NIC) that is built into computers and mobile devices. The code is assigned by the manufacturer, includes their unique identification number, and never changes.
- 47. Often referred to as hex, it is a base-16
- 48. The acronym for "Uniform Resource Locator". The systematic way to find specific web addresses and web pages.
- 50. A note in a program that describes what the code is doing. Adding them is very good programming practice,
- 52. A part of a process or system that is not seen by the user. It provides a supporting function on behalf of the main process.
- 53. Small units of data, transmitted on a network. Collected together, they compose some larger data, such as a document, a website, a movie, etc.