Cybersecurity Unit 3 Terminology
Across
- 3. A base-16 number system. The extra digits are represented by the letters a through f, so all digits in hex are 0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f.
- 6. Wired Equivalent Privacy is a security algorithm used in wireless networks.
- 7. The Maximum Transmission Unit is the maximum amount of bytes than can be packaged into frame data.
- 9. A wireless access point is a device provides connectivity to a network.
- 10. An operating system similar in concept to the Windows OS but used more often to host routers and web servers.
- 14. A media access control addresses is unique numeric code that is assigned to networking hardware components (typically a network interface card or NIC) that is built into computers and mobile devices.
- 16. The selective process of allowing or restricting the availability of a resource.
- 18. The fourth and last phase of ethical hacking in which the security professionals fix the system vulnerabilities uncovered in the previous phases.
- 19. The act of starting or launching a process. The new processes is a child process of a parent process..
- 22. The operation of joining character strings end-to-end.
- 23. A device that plots a graph of signal strength (vertical axis) versus frequency (horizontal axis).
- 25. A standard that computers use to represent letters , numbers, and symbols. (It stands for American Standard Code for Information Interchange.)
- 27. The first phase of ethical hacking, which involves probing of the network to understand its structure and to see what services are open and running.
- 28. A collection of files on a computer, logically grouped together.
Down
- 1. A program that allows a user to enter commands to interact with an operating system.
- 2. An exchange of messages that prove the identity of users and computers in a system.
- 4. The third phase of ethical hacking, which involves launching exploits at targeted vulnerabilities to see if they are genuine exposures on the system.
- 5. It can have two meanings in computer terminology: it can be a specific application or function such as email, chat, etc. or it can refer to a specific part of an application, such as transmitting the data of a webpage
- 8. Pronounced "ganoo" or "g.noo", it is a UNIX-like operating system.
- 11. A very common concept in computer science and information technology; it means that a lot of the detail of a system or a process is hidden, allowing the user to focus on the details that are important for the task at hand.
- 12. The second phase of ethical hacking, which involves taking a closer look at the services and software running on the hosts.
- 13. A starting point for data analysis. It is the initial data set used in later comparisons.
- 15. An input value to a command.
- 17. Software that is is freely available to anyone who wants to use it. Users can modify it and distribute it however they want.
- 20. A method of transferring and organizing data over a network using packets, which contain routing information along with the data.
- 21. A process in UNIX that runs without user input.
- 24. An attack where a malicious user changes and corrupts the MAC-IP address information on a target computer.
- 26. A network communication protocol occurring in the data link layer 2 and physical layer 1 of the OSI model.