Common Terms Flashcards
Hack Value
A term of describing how willing a hacker would be to invest their time/energy to crack a system, file, etc. and whether or not it’d be worth attempting.
(a file containing absolutely atrocious amounts of porn (low hack value/not hack value (probably; depending on the perpetrator) vs. a file containing someone’s passport and credit card information (high hack value/hack value)).
Vulnerability
A weakness that could compromise a system (system: not just referring to a computer system, but any system. Corporation, household, government, etc.) and could be used as a possible means of attack.
Exploit
A piece of code that takes advantage of a vulnerability to deliver malicious code.
Can also be defined as any way to take advantage of a vulnerability to attack a system.
Payload
A malicious piece of code delivered through an exploit.
R.A.T.
Remote Access Trojan
A program used by an intruder to take control of a victim’s computer remotely, giving them access to the computer’s files, allowing covert surveillance and a backdoor for administrative control
ISP
Internet Service Provider
NSP
Network Service Provider
Hash
a hash is a function that converts one value to another.
Example:
keys-v/hash function-v/hash-v John Smith ----\ [/---- ]-- 00 Chad Hecks ---/ \[/---- ]-- 01 Dirk McFunkle -/ [\ ] 02 [ \---]-- 03
Security Threat
A security - threat - is anything that has a potential of causing damage to a system/network.
Security Attack
A security -attack - is an attempt to gain unauthorized access to a system/network.
Attack Vector
An attack vector is a means by which a hacker delivers a payload to a system/network.
DOS
Disk Operating System
CPU
Central Processing Unit
GPU
Graphics Processing Unit
WPA
Wi-Fi Protected Access
The “IP” in IP address
Internet Protocol
SQL
Structured Query Language
IDS
Intrusion Detection System
DNS
Domain Name System
ARP
Address Resolution Protocol
IPS
Intrusion Prevention System
Array
An array is a data structure, which can store a fixed-size collection of elements of the same data type. An array is used to store a collection of data, but it is often more useful to think of an array as a collection of variables of the same type.
DDoS
Distributed Denial of Service
PCI DSS
Payment Card Industry Data Security Standard
HIPAA
Health Insurance Portability and Accountability Act
SOX
Sarbanes Oxley Act
DMCA
Digital Millennium Copyright Act
WIPO
World Intellectual Property Organization
FISMA
Federal Information Security Management Act
DMZ
Demilitarized Zone