Cyber Flashcards
Absolute file path
While diagnosing a server issue in a Linux environment, an engineer references /etc/apache2/apache2.conf to specify the entire location beginning at root. This ensures pinpoint accuracy, preventing mistakes that arise when relative paths lead to overlooked or duplicate directories.
Access controls
Within a financial institution, only certain employees handle loan applications. Privilege settings and password policies prevent unauthorized team members from accessing sensitive records, demonstrating how organizational structure can reinforce data protection.
Active packet sniffing
An attacker stealthily intercepts and modifies traffic between a buyer’s browser and the online store. Payment details are altered in-flight, illustrating how unprotected channels can be manipulated to redirect funds or steal information.
Address Resolution Protocol (ARP)
Before a workstation sends data over a network, it needs the physical identifier of the next router. A lookup matches the numeric network address to the hardware address, ensuring that packets flow to the intended destination without confusion.
Advanced persistent threat (APT)
A rogue actor quietly infiltrates a large corporation’s data center, siphoning off confidential research for months. The intruder stays hidden by blending into normal traffic patterns, prolonging the breach and maximizing the data theft.
Adversarial artificial intelligence (AI)
A machine-learning email filter is gradually fed deceptive training examples by malicious entities. Over time, the filter flags fewer scam emails, revealing how subtle interference can sabotage advanced automated defenses.
Adware
A free media player continuously launches pop-up banners and embedded offers whenever it’s opened. Users grow frustrated with the frequent interruptions, unaware that these on-screen promotions generate revenue for the software’s distributor.
Algorithm
A mapping service calculates the optimal driving route by weighing real-time congestion, planned road closures, and distance. This step-by-step logic systematically chooses the path that balances speed and convenience under given conditions.
Analysis
A security professional receives an off-hours notification about multiple account lockouts. Delving into logs, traffic captures, and error messages helps uncover whether an automated script or a determined threat actor is probing the system.
Angler phishing
A criminal masquerades as social media support for a well-known entertainment platform, assuring worried users they can fix billing issues if they provide credit card details. The personal touch convinces many victims that the messages are genuine.
Anomaly-based analysis
A financial service flags a credit card purchase for review when it doesn’t match the owner’s habitual spending pattern. Rather than relying on known attack signatures, the system spots outliers that might indicate fraudulent use.
Antivirus software
A computer utility constantly watches incoming files and background processes, erasing any discovered malicious code. This routine scanning keeps everyday operations safer by halting harmful executables before they spread.
Application
A user launches a dedicated program on their device to edit images for a marketing brochure. This tool focuses on a specific task—modifying graphics—offering features unavailable in more general-purpose software.
Application programming interface (API) token
A weather service grants a unique encrypted code to an app developer, letting the app retrieve the latest forecast data. Each request is verified with this code to confirm it’s coming from a trusted source.
Argument (Linux)
Someone inputs ls -l /var/www/html to see file details in the web directory. The program uses /var/www/html as the subject of the listing, interpreting it as the location being examined.
Argument (Python)
A custom function in a script might be called with add_score(10, 5). The function’s logic processes the numeric details passed in, adjusting a running total accordingly.
Array
A video game tracks the five best players in a structured list, ensuring quick access to scores and enabling easy updates whenever a new player surpasses a previous record.
Assess (NIST RMF)
An enterprise installs intrusion detection systems and verifies if they properly detect simulated attacks. Logs and test results show whether each control is effectively blocking potential threats before sign-off.
Asset
A personal smartphone containing messages, photos, and credentials demands protective measures at both the software and physical levels—highlighting how essential resources deserve thorough safeguarding.
Asset classification
An IT department labels newly developed source code as “Restricted” while routine memos remain “Public.” This labeling process guides security budgets and safety measures based on risk and confidentiality.
Asset inventory
A hospital catalogs all electronic patient record systems, diagnostic devices, and lab computers, maintaining an organized list. This helps identify which equipment needs critical updates or security patches first.
Asset management
A corporation monitors the current status of every server, laptop, and specialized tool, noting which ones pose vulnerabilities or need attention. Frequent reviews enable faster responses to evolving threats.
Asymmetric encryption
An individual sends sensitive data using an open, shareable locking mechanism, while the intended reader alone holds the secret key for unlocking. This separation of locks and keys ensures that only the correct recipient can decode messages.
Attack surface
A local shop sets up an online storefront, remote invoicing, and a cloud-based point-of-sale system. Each new feature potentially increases the ways intruders can break in, warranting thorough protective steps.
Attack tree
A tech company visualizes every possible weakness leading to customer data exposure, starting from phishing employee credentials to physically infiltrating the data center. Each path reveals how attackers might progress.
Attack vectors
Cybercriminals might slip malicious files into a free download, craft believable email scams, or trick employees with public Wi-Fi. Each trick provides an entry point for covertly accessing protected environments.
Authentication
A secure portal requests a username, password, and face recognition. The combination fortifies identity verification, making unauthorized logins much harder.
Authorization
A logged-in team member only sees certain options in the internal dashboard, while higher-level roles unlock advanced menus. Access boundaries reflect the functional separation of responsibilities.
Authorize (NIST RMF)
Executive leaders review a comprehensive risk analysis for a new payment platform and formally approve it. This sign-off acknowledges both the benefits and the associated liabilities.
Automation
A script closes stale support requests automatically if users don’t respond, reducing repetitive tasks for human agents. Fewer manual chores free time for more complex problems.
Availability
An online bookstore invests in redundant database clusters, balancing requests across several servers. Even if one goes offline, buyers can continue placing orders without interruption.
Baiting
A USB stick labeled “Executive Salaries” is left in a break room, tempting a curious staff member to plug it in. Once opened, the device executes hidden malicious code on the host computer.
Bandwidth
Users in a crowded office notice slower connections whenever large data backups run. The pipeline capacity gets saturated, creating performance lags for everyone sharing the same link.
Baseline configuration (baseline image)
New servers are rolled out using a standard template that has pre-installed security updates and necessary software. This consistency ensures each system aligns with the company’s vetted setup.
Bash
In a Unix-like environment, a professional types commands to navigate directories, manage files, and run scripts. The input is parsed and executed, offering powerful text-based control over the system.
Basic auth
A website prompts for a username and password, transmitting them in a simpler, less secure format without advanced cryptographic layers. This approach is direct but often replaced with stronger safeguards.
Basic Input/Output System (BIOS)
An older machine runs a tiny program after powering on, instructing hardware to find where the main operating system resides. This initial routine is critical for a successful startup sequence.
Biometrics
A traveler at an airport gate confirms identity using a unique facial scan, streamlining the boarding process and cutting down on manual ID checks.
Bit
A single storage element in a digital device can only be on or off, signifying the most fundamental data building block in computing.
Boolean data
An access-control system has a switch that’s either on or off, marking whether a door is locked and reinforcing straightforward, yes/no logic.
Bootloader
When powering a smartphone, a minimal program starts running. It prepares the environment by checking components and then passes control to the main system software.
Botnet
A large number of infected personal devices worldwide respond to hidden commands, sending spam or launching massive traffic floods upon a single orchestrated instruction.
Bracket notation
In a Python list, selecting index [3] retrieves the fourth element. This indexing method organizes data retrieval in a predictable way.
Broken chain of custody
After seizing a suspect’s computer drive, an investigator forgets to log where it was kept overnight. Missing records create doubt about any evidence obtained.
Brute force attack
A hacker repeatedly tries every conceivable password variation, hoping that a successful guess eventually grants entry to an account.
Bug bounty
A company publicly invites ethical hackers to find flaws, rewarding them with cash or recognition. This method helps identify holes before malicious actors discover them.
Built-in function
A programming environment provides shortcuts—like quickly measuring a string’s length—enabling rapid coding without reinventing common operations.
Business continuity
A natural disaster knocks out power across the city, but alternate datacenters keep critical applications running. Customers experience minimal service disruption thanks to layered resilience.
Business continuity plan (BCP)
A well-documented approach details backup office spaces and fallback technology solutions, allowing a seamless shift if the primary site becomes unreachable.
Business Email Compromise (BEC)
An accountant receives an urgent request to transfer funds, seemingly from the CEO. The message includes just enough personal detail to appear genuine, pressuring quick action.
Categorize (NIST RMF)
An online retailer identifies which servers are vital for processing payments and which systems only contain marketing data. Sensitivity levels guide where to dedicate the most robust defenses.
CentOS
A firm installs a freely available enterprise-grade server environment that mirrors a commercial product’s reliability. They focus on open-source benefits and stable long-term support.
Central Processing Unit (CPU)
A user with multiple browser tabs, video editing, and data modeling open simultaneously relies on a core component that orchestrates and executes instructions at blazing speed.
Chain of custody
Investigators place sealed evidence in a labeled bag, logging the time and name of each person who handles it. This rigorous audit trail maintains the integrity of what’s collected.
Chronicle
A global corporation pipes all system logs into a powerful cloud-based console, letting security teams analyze suspicious patterns or correlate events across many regions in seconds.
Cipher
A chat app scrambles messages so that, without the decoding steps, the text appears meaningless. The method ensures eavesdroppers see only jumbled content.
Cloud-based firewalls
A small company relies on a hosted security layer that scans and filters traffic through a provider’s data center, offloading the need for on-premise appliances.
Cloud computing
Engineers move from in-house hardware to remote hosted servers, paying only for the resources actually used. This flexibility saves costs and simplifies upgrades.
Cloud network
Personal photos and documents stored on an internet-accessible service become reachable from any device, removing the dependence on physical storage mediums.
Cloud security
A financial startup configures restricted roles, applies encryption, and monitors logs in a large hosting environment, ensuring customers’ data stays confidential despite the shared platform.
Command
A user at the console types mkdir projectDocs, instructing the environment to make a new folder for organizing files.
Command and control (C2)
Compromised machines phone home to a hidden hub, awaiting fresh directives that could instruct them to launch attacks, steal data, or remain silent.
Command-line interface (CLI)
In a server room, text-based instructions allow precise file manipulation, system monitoring, and script automation without needing a graphical display.
Comment
Within a code file, short annotations clarify purpose or logic, but don’t impact how the computer ultimately executes operations.
Common Event Format (CEF)
A security platform receives logs with a consistent structure, including time, source, and event details, making it simpler to filter and analyze across diverse systems.
Common Vulnerabilities and Exposures (CVE®) list
A widely recognized index assigns numbers to newly found software weaknesses, letting teams track critical issues systematically.
Common Vulnerability Scoring System (CVSS)
A software flaw that enables remote takeover might earn a near-maximum severity rating, motivating teams to fix it before lower-rated items.
Compliance
A healthcare organization employs strict data handling protocols and encryption to align with applicable privacy mandates, ensuring legal and ethical standards are met.
Computer security incident response teams (CSIRT)
A specialized group steps in when malware strikes, investigating the extent, closing gaps, and helping the business resume normal operations.
Computer virus
A self-replicating file infiltrates various folders, attaching its destructive payload to unsuspecting programs until it’s detected or removed.
Conditional statement
A code block checks if an employee’s role is “manager,” then grants them access to advanced analytics. Otherwise, the system restricts them to basic views.
Confidentiality
A corporate portal ensures only authorized people can see internal sales figures. Encryption and strict credential checks keep outside eyes away.
Confidential data
Engineers store design prototypes in a locked lab and limit access to senior staff. Revealing such materials could undermine competitive advantage.
Confidentiality, integrity, availability (CIA) triad
A secure hospital system only shows patient records to doctors, guards info from tampering, and ensures records stay online for medical emergencies.
Configuration file
A text entry—listen 443—within a server’s configuration sets which port to accept secure traffic, letting the software adapt without recompiling.
Containment
After malware is detected on a workstation, administrators disconnect it from the network. This swift isolation prevents the infection from spreading deeper.
Controlled zone
A company’s servers sit behind a protective barrier, separating them from public networks. Entry points are restricted to reduce unwanted infiltration.
Cross-site scripting (XSS)
A malicious comment on a forum feeds unfiltered code to each visitor’s browser, secretly extracting login tokens for misuse.
Crowdsourcing
A nonprofit group solicits ideas from global volunteers on designing better cybersecurity training modules, tapping the wisdom of many.
Cryptographic attack
A determined adversary tries various keys or algorithm tricks to unlock encrypted data, probing for any sign of mathematical weakness.
Cryptographic key
A specialized string ensures that scrambled messages can only be unscrambled by someone holding the matching piece, preventing casual interception.
Cryptography
Messages in transit get encoded using transformations only authorized parties can reverse, deterring digital eavesdropping or forgery attempts.
Cryptojacking
An unnoticed script hijacks a workstation’s processing power to mine virtual currency, causing performance slowdowns while quietly benefiting the attackers.
CVE Numbering Authority (CNA)
Certain prominent software makers receive the authority to assign official IDs to new vulnerabilities discovered in their products, streamlining tracking and disclosure.
Cybersecurity (or security)
An organization coordinates defenses—firewalls, employee training, encryption, and monitoring—so data theft or sabotage attempts are less likely to succeed.
Data
Every online post, clicked link, or file download turns real-world actions into digital records, forming the essence of modern life’s information exchange.
Data at rest
An archive of old user profiles on a backup drive remains untouched. Since it’s not actively in use, it’s only accessed when a restore is needed or a policy demands review.
Database
A structured system organizes product inventories, customer orders, and shipping details into tables. Queries allow rapid lookups or updates at scale.
Data controller
A marketing team decides what personal details to collect for a campaign, setting how and why this information is used, shaping the broader data strategy.
Data custodian
A hosting provider physically stores and secures files on behalf of an enterprise. Though they don’t dictate business rules, they must ensure that stored information remains safeguarded.
Data exfiltration
A disgruntled staff member discreetly copies sensitive intellectual property onto a hidden USB drive, intending to leak it to a competitor.
Data in transit
An emailed contract passes through multiple network routers, vulnerable to interception if it isn’t properly protected along the path.
Data in use
While editing a spreadsheet, the active cells live in working memory, making them vulnerable if malicious software gains access at that moment.
Data owner
An attorney in a law firm decides who has permission to open particular case files, taking ultimate responsibility for the confidentiality of that content.
Data packet
A streamed video breaks into numerous small chunks. Each travels a complex route over the internet, reassembling seamlessly on the viewer’s device.
Data point
A phone’s location log at a single timestamp stands as a discrete measurement among many that map user movement and behavior trends.
Data processor
A marketing platform handles client-supplied email lists, sending promotions according to explicit client instructions without owning the data itself.
Data protection officer (DPO)
A hospital appoints a specialist to ensure all activities, from patient record handling to staff training, meet stringent data privacy regulations.
Data type
In a script, numerical fields like 42 are processed differently than a text field like ‘Address.’ Each format is handled by different logic rules.
Date and time data
A system logs an event as 2025-01-15 14:00:00, documenting both calendar day and exact moment for thorough auditing or scheduling.
Debugger
A developer halts a program mid-run to inspect values, stepping line-by-line to discover which logic flaw is causing a repeated crash.
Debugging
An interactive approach narrows down a bug by methodically eliminating issues, checking each variable until the faulty logic or calculation emerges.
Defense in depth
A combination of perimeter firewalls, host-level monitoring, intrusion detection, and regular patching forms multiple overlapping shields to deter would-be infiltrators.
Denial of service (DoS) attack
Maliciously overwhelming a target with far more data requests than it can handle leaves legitimate users locked out, halting normal operations.
Detect (NIST core function)
A finance company sets up real-time monitoring systems that spot irregular transactions quickly, minimizing harmful fraud attempts.
Detection
Network sensors alert an administrator the moment unusual outbound connections emerge, hinting at a possible early-stage intrusion.
Dictionary data
A key-value layout in code organizes user details, enabling quick lookups by specifying the field name for direct retrieval.
Digital certificate
While navigating to an encrypted site, the browser verifies a digital signature that vouches for the site’s legitimacy and encryption authority.
Digital forensics
After a network intrusion, specialists meticulously examine log files, memory captures, and disk images to piece together exactly how the incursion unfolded.
Directory
A workspace on a system collects relevant files together, letting users and administrators keep projects separate and well-structured.
Disaster recovery plan
A thorough document outlines how an organization will restore critical processes if a hurricane wipes out the main office, ensuring readiness for worst-case events.
Distributed denial of service (DDoS) attack
An entire army of compromised machines collectively bombards a website with requests, pushing bandwidth and servers to their limits.
Distributions
Enthusiasts select from variants that share a core platform but differ in available packages, default tools, or targeted use-cases.
Documentation
Explicitly written steps help staff respond consistently to suspicious emails, ensuring no critical action is missed under pressure.
DOM-based XSS attack
Malicious code is embedded into a webpage’s own script logic, activating when a user’s browser processes or interacts with certain elements locally.
Domain Name System (DNS)
Whenever a user types a website name, a lookup transforms that human-readable label into a numerical destination recognized by the internet.
Dropper
A small, unremarkable file sneaks into a system and then quietly fetches a heavier malicious program, expanding the scope of the infection.
Elevator pitch
In a brief moment with a potential sponsor, someone articulates their cybersecurity background and major accomplishments, aiming to spark further discussion.
Encapsulation
A hidden channel around the original data is formed, making outside observers see only protected information that they can’t decode.
Encryption
An online banking service automatically scrambles all transmitted details, minimizing risk even if criminals intercept the traffic.
Endpoint
Workstations, mobile devices, or servers all connect to the bigger network and require protective measures, as they can be exploited individually.
Endpoint detection and response (EDR)
A protective client continually monitors a computer for questionable behavior, quarantining suspicious files and sending alerts for deeper review.
Eradication
Once investigations confirm infiltration points, every trace of harmful code is uprooted, and vulnerable paths are reinforced against repeat attacks.
Escalation policy
If an on-call engineer fails to address a severe nighttime breach within an hour, the incident auto-assigns to a more senior team for emergency containment.
Event
A user logs in from a remote country at 3 A.M., prompting a flag in the security console that something might be amiss.
Exception
Code attempting to open a file that doesn’t exist halts abruptly unless there’s a fallback routine specifying what to do in this unexpected case.
Exclusive operator
A coding rule in a raffle app checks whether a user qualifies either for the discount or the freebie, but not both, ensuring no double rewards.
Exploit
Attackers see an unsecured admin panel and slip in with zero barriers, taking advantage of a setting left wide open.
Exposure
Sensitive credentials remain in a public repository, meaning anyone with a browser can locate and misuse the keys for unauthorized data access.
External threat
Phishing emails from unknown origins flow into staff inboxes, aiming to dupe people into revealing internal login details.
False negative
Malicious code hides in plain sight because the scanner mistakenly believes the file is safe, allowing the infection to spread undetected.
False positive
A security system flags a routine system update as malicious, resulting in blocked downloads and wasted time investigating a benign file.
Fileless malware
A hidden script leverages built-in command-line tools so nothing new is written to disk, making detection by traditional antivirus more difficult.
File path
On a Windows system, something like D:\Projects\2025\Tasks.xlsx points directly to the spreadsheet’s exact location on that drive.
Filesystem Hierarchy Standard (FHS)
A Linux user places host settings in /etc and log files in /var/log, following the typical organizational approach many distributions uphold.
Filtering
A team examining a large data table narrows down entries to a specific date range, rapidly isolating relevant information without manually scanning everything.
Final report
After investigating a ransomware outbreak, security leaders compile timelines, discovered root causes, and recommended improvements into one comprehensive document.
Firewall
A protective barrier silently inspects passing data, discarding anything that doesn’t comply with safe usage rules, thus restricting malicious intrusions.
Float data
Financial calculations, such as interest rates, rely on decimal precision to avoid rounding errors that could add up significantly over time.
Foreign key
One table in a database references a unique identifier from another table, ensuring proper relationships and preventing mismatched records.
Forward proxy server
A university sends all student web traffic through a single point, applying content filters or logging usage before forwarding the request to the internet.
Function
A chunk of reusable script might handle logging for an application, centralizing the process of writing consistent entries in a system log.
Global variable
A file declares a configuration parameter accessible everywhere else in the code, impacting many functions that rely on that same setting.
Graphical user interface (GUI)
A user navigates via buttons and icons on the screen, rarely typing commands and relying instead on visual elements to operate the machine.
Hacker
A curious individual or group attempts to bypass standard defenses for various reasons, ranging from beneficial auditing to malicious sabotage.
Hacktivist
A group targeting government websites defaces official pages in protest, merging technical break-ins with a socially or politically charged message.
Hard drive
A physical storage medium in a desktop or laptop holds personal data, programs, and the operating system for quick retrieval until it fails or is replaced.
Hardware
Physical building blocks like memory chips, CPUs, and circuit boards power digital functionalities; without them, software cannot run.
Hash collision
An improbability occurs when two different inputs produce the same digital fingerprint, questioning the reliability of that hashing approach.
Hash function
A user’s password is converted into a one-way scrambled form for secure storage, preventing the original string from being casually retrieved.
Hash table
A data structure uses a special formula to locate the right “bucket” quickly, allowing near-instant lookups even in large collections.
Health Insurance Portability and Accountability Act (HIPAA)
A clinic enforces strict access logs, encryption, and private record-keeping practices to avoid leaking patient details, aligning with mandated guidelines.
Honeypot
A decoy environment intentionally lures attackers, documenting every move so defenders can learn infiltration techniques without risking actual data.
Host-based intrusion detection system (HIDS)
A single workstation runs a monitoring agent that checks for suspicious file changes, unauthorized ports opening, or unrecognized background services.
Hub
In a simpler network setup, data frames sent in one port show up on all other ports, lacking the intelligence to route traffic only where needed.
Hypertext Transfer Protocol (HTTP)
When connecting to an unencrypted webpage, text flows in both directions, exposing content to anyone who intercepts the traffic.
Hypertext Transfer Protocol Secure (HTTPS)
Web activity is protected by encryption, allowing login forms, personal messages, and financial info to traverse the internet with confidentiality intact.
Identify (NIST core function)
A business systematically looks at digital assets, ranking those critical for operation and acknowledging associated hazards so they can be addressed.
Identity and access management (IAM)
A system centralizes user logins, multi-factor checks, and role-based permissions, unifying how individuals prove who they are and what they can do.
IEEE 802.11 (Wi-Fi)
Wireless signals let laptops and phones communicate without cables, adhering to a set of standards that define speed, range, and security.
Immutable
A text string in certain programming languages can’t be changed once created, forcing new copies whenever a character sequence is revised.
Implement (NIST RMF)
An organization sets the chosen defenses in motion—deploying encryption, setting up intrusion monitoring, and recording official steps taken for auditing.
Improper usage
A staff member uses company equipment to illegally download copyrighted media, violating the organization’s guidelines and introducing new liability concerns.
Incident
A genuine crisis or near miss occurs—a compromised database or an attempted system hack—disrupting normal confidentiality, integrity, or availability.
Incident escalation
When frontline responders realize the scope of an infiltration is beyond their skill set, they shift the matter to senior investigators capable of deeper remediation.
Incident handler’s journal
A crisis responder maintains detailed entries of commands run, files accessed, and system logs checked, ensuring a complete event history for post-mortem analysis.
Incident response
A retailer’s website experiences customer card data theft, prompting an emergency plan: isolate impacted servers, remove malicious scripts, and inform stakeholders.
Incident response plan
A formal guide lists roles, contact details, and step-by-step actions employees must follow as soon as a cybersecurity alarm sounds.
Inclusive operator
A piece of logic checks if an order meets or exceeds a quantity threshold to qualify for special pricing, capturing any boundary case that meets the requirement.
Indentation
In certain languages, blocks are recognized by how many spaces precede each line, making visual formatting part of the language grammar.
Index
Selecting the first element from a list relies on an integer offset, ensuring the program fetches precisely the desired item.
Indicators of attack (IoA)
Uninstalling security software followed by attempts to run questionable scripts reveals a possibly active intrusion in its early stages.
Indicators of compromise (IoC)
Unfamiliar connections at odd hours, unexpected user account creation, or unknown processes running highlight that something malicious might have happened.
Information privacy
A user configures social media settings so only close friends can see personal updates, keeping random strangers out of those posts.
Information security (InfoSec)
Protective measures include network segmentation, rigorous training, and careful auditing, aiming to safeguard a company’s digital environment and data lifeblood.
Injection attack
Unsanitized user input leads to unintended commands executing in the backend database or system, often with results that compromise data integrity.
Input validation
An application ensures that only numerical values are entered for age, eliminating problematic strings or code that could corrupt the database.
Integer data
Inventory systems rely on whole numbers for items in stock, preventing confusion that might occur if decimals were mistakenly added to product counts.
Integrated development environment (IDE)
A programmer edits code in a specialized tool that flags errors, autocompletes functions, and debugs logic to speed up the software creation cycle.
Integrity
A file’s fingerprint changes if any part of it is altered, helping an organization verify whether stored data remains authentic and unmodified.
Internal hardware
A tower case encloses the CPU, RAM, and motherboard, physically powering the operating system and user applications.
Internal threat
A disenchanted employee with administrative privileges chooses to sabotage or steal critical resources, harming from the inside.
Internet Control Message Protocol (ICMP)
When “pinging” a remote system, tiny echo requests and replies measure whether the system is reachable and how long it takes to respond.
Internet Control Message Protocol flood (ICMP flood)
A wave of ping requests swamps a target machine, consuming its bandwidth or processing power and degrading performance for legitimate users.
Internet Protocol (IP)
Each chunk of data traveling online uses a structured addressing system to navigate from sender to receiver, akin to mailing addresses.
Internet Protocol (IP) address
A unique identifier, like 10.0.0.25, points traffic to the right device on a local or wide network, guiding packets to the correct location.
Interpreter
A language environment reads each script instruction, translating it on the fly into actions that the computer performs immediately.
Intrusion detection system (IDS)
A monitoring apparatus scrutinizes traffic, raising alarms if it observes any pattern matching known malicious footprints or unexpected anomalies.
Intrusion prevention system (IPS)
Beyond just alerting, this protective layer blocks questionable data flows or halts processes deemed threatening.
IP spoofing
Data packets appear to come from a trusted machine, tricking basic filters into believing the traffic is from a legitimate source.
Iterative statement
A looping construct repeatedly executes a block of code, stepping through data or continuing until a specified stop condition is met.
KALI LINUX™
A specialized environment loaded with scanning, exploitation, and forensic tools helps ethical testers identify and exploit security gaps to fix them.
Kernel
A central coordinator in a system manages CPU time, memory allocation, and device interactions, ensuring user programs can run effectively.
Key-value pair
Configuration settings might store serverHost=prodServer. The label points to the item, letting the application interpret that value whenever needed.
Legacy operating system
A factory sticks with an older version of software because it relies on custom programs that break on modern platforms, risking exposure to unpatched flaws.
Lessons learned meeting
After a social engineering success, the team convenes to analyze how they fell for the trick and to devise stronger policies or training to prevent repetition.
Library
A pre-compiled bundle of code handles common tasks, letting developers reuse proven routines for file handling, network requests, or math computations.
Linux
A widely adopted kernel powers countless variants, prized for its open nature and flexibility in server, desktop, and embedded environments.
List concatenation
A script merges two collections—like [1, 2] and [3, 4]—into a new sequence, forming [1, 2, 3, 4] for unified data handling.
List data
A user arranges a to-do list in code: [“Buy groceries”, “Email manager”, “Schedule checkup”], maintaining order for each upcoming task.
Loader
A tiny agent infiltrates a machine. It waits for commands to pull the real malicious payload from a remote location when triggered.
Local Area Network (LAN)
All computers, printers, and other devices in a small office are tied together, facilitating resource sharing and internal collaboration.
Local variable
Inside a function, a short-lived name references a piece of data, disappearing after that function ends and freeing up resources.
Log
Each time a user logs in or a critical system operation completes, a timestamped record is created, providing evidence for future analysis or audits.
Log analysis
Security staff pour through thousands of recorded events, identifying hidden anomalies or patterns that might indicate malicious or unstable behavior.
Logging
A service documents every transaction, state change, and error along the way, building a historical record for debugging and compliance.
Logic error
A script calculates total sales incorrectly if an internal formula points to the wrong variable, producing no compiler alert but clearly flawed outcomes.
Log management
A centralized platform gathers data from servers, firewalls, and applications into one place, ensuring important alerts and context aren’t missed.
Loop condition
A repetition continues as long as a certain test remains true, controlling how many times a sequence of instructions executes.
Loop variable
Counting from 0 to 9 in a loop requires a single placeholder that increments by 1 each cycle until hitting 10.
Malware
Malicious software disrupts or quietly abuses systems for theft, destruction, or espionage, often hidden behind seemingly harmless files or links.
Malware infection
Clicking a suspicious link results in destructive code spreading throughout the corporate network if not promptly contained.
Media Access Control (MAC) address
Network adapters each hold a hardware identifier, typically unique worldwide, used for delivering messages at the link layer.
Method
In a programming language, some objects come with built-in routines; for instance, a text string can be converted to uppercase with a quick call.
Metrics
Website uptime, page loading speed, and error rates help measure the stability of digital services, guiding improvements and capacity planning.
MITRE
Security pros reference a well-curated taxonomy that documents adversary methods, enabling consistent threat analysis and communication worldwide.
Modem
A box at home translates signals from an internet provider into digital data that routers and computers understand, bridging external and local networks.
Module
A set of Python code components might handle networking tasks; importing it provides direct access to pre-written, tested functionality.
Monitor (NIST RMF)
After implementing defensive measures, a continuous watch ensures these safeguards remain effective and adjusts if new threats emerge.
Multi-factor authentication (MFA)
A second verification—like a smartphone approval—thwarts attackers who might steal passwords but lack additional keys.
nano
A simple text editor on Unix-like systems helps administrators modify configuration files quickly without advanced or complex features.
National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF)
An overarching structure helps businesses identify, protect, detect, respond, and recover, guiding strategic decisions around security practices.
National Institute of Standards and Technology (NIST) Incident Response Lifecycle
After attackers strike, teams work through phases: readiness, detection, confinement, resolution, and a retrospective to strengthen future defenses.
National Institute of Standards and Technology (NIST) Special Publication (S.P.) 800-53
Government-affiliated guidance outlines baseline controls—from encryption policies to physical safeguards—to ensure standardized risk management.
Network
Multiple machines communicate with each other or the internet, sharing files and resources, enabled by protocols and physical connections.
Network-based intrusion detection system (NIDS)
A device on the subnet sees all passing data, checking patterns for signatures or anomalies that imply malicious attempts.
Network data
A streaming service pushes video frames over the internet, sending a continuous flow of small units from its servers to each viewer.
Network Interface Card (NIC)
The embedded or plug-in component letting a computer speak to others via Ethernet or Wi-Fi, effectively bridging software with physical signals.
Network log analysis
Reviewing router or firewall records can reveal suspicious spikes in outbound traffic, unrecognized IPs, or repeated connection failures.
Network protocol analyzer (packet sniffer)
A diagnostic tool captures raw data transmissions, helping engineers troubleshoot or security analysts confirm suspicious communications.
Network protocols
A set of rules, such as TCP or UDP, define how information is packaged, addressed, transmitted, and received in a standardized manner.
Network security
A retail chain enforces a specialized firewall, robust wireless encryption, and a segmented architecture, ensuring minimal unauthorized internal movement if one piece is compromised.
Network segmentation
A manufacturing line keeps industrial control systems on a specialized internal subnet, protecting it from the corporate employee network and outside threats.
Network traffic
Browsing, emails, file syncs, and video calls collectively form data flowing across connected devices, carrying content between points.
Non-repudiation
A digitally signed message binds the identity of the sender, making it difficult to deny they originated the communication or transaction.
Notebook
A scientist runs code, shows charts, and writes commentary in one interactive environment, making research steps transparent and reproducible.
Numeric data
Whether it’s user age or the number of product items sold, storing numeric values ensures arithmetic or comparisons remain feasible.
OAuth
A user logs into a third-party site via a large identity provider, granting only the specific info needed, never sharing the main password.
Object
A structure in certain languages organizes data fields and related behaviors, offering a blueprint for advanced data manipulation.
On-path attack
A hidden intermediary intercepts messages from both sides, reading or altering them before passing them along, unnoticed by sender or receiver.
Open-source intelligence (OSINT)
Public digital footprints, like social media updates or posted code, can be aggregated to build a surprisingly detailed profile of a target.
Open systems interconnection (OSI) model
A conceptual approach breaks network communication into layered steps, clarifying how data travels from hardware signals to application messages.
Open Web Application Security Project (OWASP)
Developers consult influential guidance outlining the gravest pitfalls for web apps, ensuring they address common coding oversights.
Operating system (OS)
A foundational layer coordinates hardware resources, memory, and application interfaces, enabling a smooth environment to run software.
Operator
In a programming context, certain symbols manipulate variables—like + for arithmetic or == for comparison—shaping how data is handled.
Options
Typing ls -a might display hidden files in addition to visible ones, altering the command’s behavior with extra flags.
Order of volatility
In a forensics situation, data in live memory is collected first because it disappears upon shutdown, while logs on disks remain longer.
OWASP Top 10
Engineers build web platforms with knowledge of frequently exploited coding mistakes—like cross-site scripting or SQL injection—aiming to dodge them.
Package
A collection of modules in Python might come pre-organized for advanced math or data processing, installable in one step for broad functionality.
Package manager
A maintenance tool tracks software dependencies, so installing one app automatically retrieves everything else it needs to function.
Packet capture (P-cap)
An administrator records network transmissions to a file, enabling post-incident replay and detailed scrutiny of suspicious data flows.
Packet sniffing
An observer at a public hotspot reads unencrypted traffic, gleaning emails or logins from unsuspecting users who connect without secure channels.
Parameter (Python)
A function blueprint includes placeholders where real values plug in during execution, letting the same routine work for multiple inputs.
Parrot
A specialized Linux variant includes built-in pentesting scripts and privacy utilities, favored by security researchers seeking a different environment from other well-known toolkits.
Parsing
Software breaks raw lines of data into labeled fragments, making logs or user inputs structured and easier to analyze or transform.
Passive packet sniffing
Someone taps into older hub-based networks, silently monitoring transmissions without injecting or altering any data, often going unnoticed.
Password attack
Using stolen credentials or systematically guessing until a login works, a malicious party attempts to gain unauthorized account access.
Patch update
Developers release a crucial fix after identifying a software bug that allows malicious code execution, urging immediate upgrades to block exploitation.
Payment Card Industry Data Security Standards (PCI DSS)
An e-commerce site applies mandatory encryption for card details and strictly limits which employees may see sensitive transaction data to avoid regulatory penalties.
Penetration test (pen test)
Ethical hackers thoroughly challenge an organization’s defenses, from external scanning to social engineering, sharing insights on vulnerabilities discovered.
PEP 8 style guide
Python code readability improves when common formatting, naming, and spacing conventions are followed, enabling consistency among multiple developers.
Peripheral devices
External attachments like printers or external hard drives expand a computer’s capabilities but must also be guarded against malicious tampering.
Permissions
A user can only read a file on a shared drive, while another can both read and write, reflecting different privilege levels set by the system.
Personally identifiable information (PII)
Details such as a full name, home address, or ID number can reveal someone’s identity, requiring careful protection to prevent misuse.
Phishing
An employee receives a well-crafted email from what looks like an internal manager, urging them to follow a link and fill in a password.
Phishing kit
A pre-packaged set of fake site templates and scripts is sold in hidden forums, letting amateurs launch impersonation campaigns easily.
Physical attack
Somebody physically intrudes into an office’s server room, overriding electronic locks or tampering with cables to access data without leaving a digital trace.
Physical social engineering
A newcomer tailgates behind someone else’s keycard-swipe entry, bypassing security by exploiting politeness or inattentiveness from the legitimate employee.
Ping of death
An unusually large network echo request is dispatched, surpassing buffer limits on older systems, potentially crashing them outright.
Playbook
A set of guidelines spells out the exact steps responders follow upon detecting ransomware, from isolating machines to contacting legal counsel.
Policy
An organization insists that every device be updated monthly and no personal USB drives are allowed, forming part of official guidelines for daily work.
Port
A listening post on a machine awaits certain kinds of traffic, distinguishing web server requests from remote login connections or email transmissions.
Port filtering
A security layer blocks all traffic except for a few authorized channels, letting specific services like SSH or HTTPS pass while discarding the rest.
Post-incident activity
After a malicious infiltration is resolved, the team revisits logs to learn from mistakes, refining processes for more robust prevention next time.
Potentially unwanted application (PUA)
A seemingly legitimate tool also installs browser add-ons or displays persistent ads, frustrating users by diminishing device performance or collecting usage data.
Private data
Personal diaries or non-public records deserve carefully restricted access, ensuring that unauthorized parties can’t read or share them.
Prepare (NIST RMF)
An organization invests in staff training, architecture reviews, and tabletop drills, building readiness for future incidents and shaping early response strategies.
Prepared statement
Developers craft database queries with placeholders, separating the command logic from any user input, thereby reducing injection risks.
Primary key
A system ensures each record in a user table has an exclusive identifier, preventing duplicates and enabling direct referencing for lookups.
Principle of least privilege
An assistant in finance sees only partial financial data needed for daily tasks, preventing access to entire budgets or confidential HR info.
Privacy protection
A messaging platform conceals phone numbers and applies end-to-end scrambling so only the communicating parties can decipher the messages.
Procedures
A medical practice outlines a step-by-step method for eliminating expired patient records, ensuring compliance and consistency in document destruction.
Process of Attack Simulation and Threat Analysis (PASTA)
Security teams systematically model potential threats, evaluating each route an attacker might take, then building proportional defenses aligned with actual risk.
Programming
A coder writes an automated script to compress logs every night, saving storage and making it simpler to retrieve historical data.
Protect (NIST core function)
A business enforces strong authentication, firewall rules, and data encryption, forming the crucial layer to deter or slow intruders.
Protected health information (PHI)
Medical test results, billing details, and prescriptions require extra safeguards, since leaking them can cause severe personal and legal repercussions.
Protecting and preserving evidence
A forensic copy of a compromised drive is made, ensuring no changes occur to the original. This method validates the authenticity of findings for legal processes.
Proxy server
All employee web traffic flows through an intermediate device that filters disallowed sites and logs activities, adding a corporate safeguard and usage oversight.
Public data
A government agency posts open datasets of city traffic statistics, making them freely accessible for research and transparency.
Public key infrastructure (PKI)
A chain of trust relies on recognized authorities that sign certificates, so web browsers automatically trust certain site credentials for encrypted sessions.
Python Standard Library
Basic modules for tasks like file manipulation, system interaction, or date formatting ship with the environment, removing the need for many external packages.
Query
A database request fetches all records of high-value customers who made purchases in a specific month, allowing refined analytics or marketing strategies.
Quid pro quo
A scam phone call promises special IT support or freebies in exchange for user credentials, relying on the victim’s desire for quick help.
Rainbow table
Precomputed cryptographic outputs for commonly used passwords speed up the unscrambling of poorly secured user logins.
Random Access Memory (RAM)
When multiple applications run, they keep active data here for fast retrieval. Power loss wipes the contents, making it ephemeral but vital for performance.
Ransomware
Malicious code silently encrypts crucial files, presenting a demand for money to unlock them; without backups, organizations face heavy disruption or data loss.
Rapport
During a brief conversation, the interviewee connects over a shared interest with the interviewer, easing tension and fostering a more open dialogue.
Recover (NIST core function)
A team reestablishes data and systems after a destructive breach, leaning on backups and carefully tested restoration steps to resume normal activities.
Recovery
A hospital faced with a widespread encryption fiasco reverts to offline repositories and validated backups, bringing patient care systems back online in phases.
Red Hat® Enterprise Linux®
An enterprise invests in a commercially supported variant with official updates, ensuring confidence in patches and timely vendor help for mission-critical tasks.
Reflected XSS attack
A malicious parameter in a URL bounces back from the server into the user’s browser, triggering harmful scripts that steal sensitive details.
Regular expression (regex)
A data-cleaning script uses a pattern to locate email addresses in unstructured text, standardizing them for consistent storage in a structured format.
Regulations
A financial services firm abides by industry mandates, encrypting all card transactions and auditing staff access, or else faces penalties.
Relational database
A reservation system links customer details, seat assignments, and payment records, ensuring consistent data across interconnected tables.
Relative file path
A developer references ../images/header.png from a webpage in a subfolder, adjusting the location dynamically based on the page’s current directory.
Replay attack
A previously valid login token gets captured and reused, fooling the system into thinking the user is logging in anew without fresh credentials.
Resiliency
A multinational enterprise mirrors data in multiple geographic regions, so a local natural disaster can’t completely halt its services or cause total data loss.
Respond (NIST core function)
An alert triggers immediate isolation of an infected machine, forensics to gauge damage, and patches or rule updates to counter the discovered threat.
Return statement
A block of code processes input and finally hands back a computed outcome to the part of the program that requested it.
Reverse proxy server
External site visitors connect first to an intermediate host. Requests are scrutinized or transformed before being forwarded to the actual web service inside the network.
Risk
Leaving an admin console accessible to all internet users could lead to server control being seized. The probability of a breach multiplies if no restrictions are in place.
Risk mitigation
A bank invests in second-factor authentication and frequent patching, reducing both the likelihood and impact of credential attacks or software flaws.
Root directory
On certain systems, everything branches downward from a single top-level folder, forming the foundational structure of stored files and subfolders.
Rootkit
Deep-level malicious modifications conceal themselves within the operating environment, letting intruders remotely control a system while hiding evidence from most detection.
Root user (or superuser)
A powerful account holds complete authority to install packages, edit system files, or remove restrictions, requiring extra caution in daily use.
Router
An intermediary piece of hardware inspects incoming messages, directing them to the correct device in a home or office network.
Salting
Password hashing gains complexity through added random strings. Two users with the same passphrase end up with distinct stored values, preventing direct comparison.
Scareware
Pop-ups shout that a user’s system is dangerously infected, pressuring them to buy a dubious cleanup tool that’s actually harmful or useless.
Search Processing Language (SPL)
A specialized syntax surfaces from large log collections, letting operators quickly filter results—for example, focusing on 404 errors at certain timestamps.
Secure File Transfer Protocol (SFTP)
Files transferred across networks are shielded by an encrypted tunnel, minimizing the chance that personal or proprietary data will be intercepted.
Secure shell (SSH)
An admin safely logs into a remote server via an encrypted line, preventing potential eavesdroppers from grabbing sensitive credentials.
Security architecture
A blueprint of layered defenses, segmented networks, and role-based policies shapes the organization’s protective design before systems are deployed.
Security audit
External specialists review an organization’s setup, comparing current practices against best practices or mandated guidelines and identifying shortfalls.
Security controls
Safeguards like encryption, multi-factor authentication, and content filtering collectively reduce the chances of successful system abuse.
Security ethics
A junior specialist stumbles on unencrypted social security numbers in a log. Reporting the oversight responsibly aligns with moral and professional standards.
Security frameworks
An organization systematically adopts recognized methods, ensuring comprehensive threat coverage rather than piecemeal patchwork solutions.
Security governance
Executives shape the formal direction and oversight of protective measures, distributing responsibilities and verifying compliance across the enterprise.
Security hardening
An administrator closes unused ports, removes default credentials, and applies the latest patches, reducing the number of possible openings for attackers.
Security information and event management (SIEM)
A monitoring system collects logs from diverse sources, running correlation rules to detect potential intrusions in real time and alert staff.
Security mindset
Developers ask, “How could someone misuse this?” as they design features, addressing vulnerabilities before attackers discover them.
Security operations center (SOC)
Around-the-clock observers coordinate threat detection, analyzing anomalies, and initiating the response to incidents across the business.
Security orchestration, automation, and response (SOAR)
A platform aggregates alerts, enriches them with intelligence, and triggers automatic isolation of suspicious endpoints, letting teams focus on deeper analysis.
Security posture
A company invests in robust tools, continuous employee security drills, and thorough patching cycles, reflecting an advanced stance against emerging cyber threats.
Security zone
Critical servers sit in a restricted network area, requiring robust authentication and minimal open ports, while public services reside in a less-trusted perimeter.
Select (NIST RMF)
Risk evaluations lead a company to choose which protection measures—like mandatory encryption or advanced scanning—are most suitable to address documented hazards.
Sensitive data
An app that stores government-issued IDs and personal addresses ensures encryption, restricting in-house staff’s access to only those who need it.
Sensitive personally identifiable information (SPII)
Documents holding name, date of birth, plus driver’s license data form a risky combination that could lead to identity theft if leaked.
Separation of duties
One clerk processes purchase orders while another signs off on final approval, limiting the power any single person wields over financial transactions.
Session
While shopping online, the site remembers user-selected items across multiple page visits, storing a temporary context to tie everything together until checkout.
Session cookie
A small identifier in the browser notifies the website which basket or user account is associated with each new request, disappearing after logout.
Session hijacking
An adversary grabs a valid session token from an unprotected network, slipping into a user’s session without needing credentials again.
Session ID
A random string is assigned when someone logs in, letting the server keep track of interactions tied to that user’s login phase.
Set data
A programming variable collects distinct categories (like {"apples", "bananas", "cherries"}), ignoring repeated insertions to remain a unique set.
Shared responsibility
A customer uses a major cloud service, with the provider securing data centers and hardware, while the customer must configure applications and manage user privileges.
Shell
A text-based environment interprets typed commands for copying files, stopping processes, or changing system-wide settings on Unix-like or other platforms.
Signature
An antivirus engine checks incoming files for known malicious byte patterns. If they match, the file is quarantined or deleted.
Signature analysis
A detection device compares traffic to a database of recognized malicious footprints, triggering immediate warnings if it spots a match.
Simple Network Management Protocol (SNMP)
Networking gear reports metrics—like CPU load or interface stats—to an overseeing console, aiding in performance monitoring and fault detection.
Single sign-on (SSO)
A user enters login details once and seamlessly moves among various corporate apps without re-entering passwords each time.
Smishing
A text on someone’s phone claims a big refund is waiting if they click a link. In reality, that link leads to a phishing site or malware-laden page.
Smurf attack
Spoofed ping requests broadcast across a network cause a flurry of replies flooding back to the forged source, overwhelming it.
Social engineering
Someone pretends to be tech support, coaxing a staff member into giving credentials. Exploiting trust bypasses even strong technical defenses.
Social media phishing
Openly accessible posts about a user’s pet or recent vacation help fraudsters craft personalized lures that seem more convincing.
Spear phishing
An email addresses its target by name, references their specific job role, and includes relevant office details, boosting credibility for the con.
Speed
A consumer’s broadband plan allows an upper limit of megabits per second, shaping how quickly they can download or stream content.
Splunk Cloud
A large entity sends event logs to a remotely managed analytics platform, relieving on-premises hardware constraints while gaining real-time threat visibility.
Splunk Enterprise
Servers on the corporate network ingest logs into a local analysis system, letting administrators correlate data and trigger action from inside the firewall.
Spyware
An unnoticed tool monitors keystrokes or web browsing habits, forwarding personal details to a hidden third party for data gathering or profit.
SQL (Structured Query Language)
A standard approach to creating, reading, updating, or deleting structured records in a table-based storage system, widely used in back-end services.
SQL injection
An input form without proper checks allows threat actors to slip in additional commands, reading or modifying data beyond normal authorization.
Stakeholder
C-level executives, managers, and department leads each have vested interests in how a security initiative proceeds, influencing funding or acceptance.
Standard error
A script’s mistakes and critical alerts flow to a separate output stream, ensuring they’re distinguished from normal results in logs or screens.
Standard input
A user’s typed data or piped text enters a running process in real time, guiding or modifying how the program behaves.
Standard output
Messages the program prints by default often appear on the screen, or are redirected to log files for future reference.
Standards
An organization aligns its system configurations with recognized benchmarks, ensuring best-practice settings for everything from account lockouts to patch schedules.
STAR method
In an interview, real-world examples are detailed step by step, discussing the situation, task, actions taken, and the final outcome to illustrate problem-solving in practice.
Stateful
Traffic filtering logic that tracks ongoing communication sessions, allowing returning packets that match an established conversation while blocking the rest.
Stateless
Every packet is filtered purely on rules without regard to prior context; each arrival is judged on its own, simplifying but reducing adaptability.
Stored XSS attack
Unfiltered user input writes malicious scripts into a website’s database, which unsuspecting visitors execute when they load the compromised pages.
String concatenation
Uniting "Hello " and "World" yields "Hello World", merging separate textual segments into a single phrase.
String data
A variable carrying a password, city name, or comment text uses a sequence of characters, manipulated differently than numbers or booleans.
Style guide
Company publications remain uniform by applying the same fonts, colors, and structural layouts, forming a consistent brand image across documents.
Subnetting
A large corporate network breaks addresses into sub-ranges, fostering better organization, improved security boundaries, and efficient traffic handling.
Substring
“From "Cybersecurity
Sudo
A command typed with elevated rights on a Unix-based system grants temporary privileges to manage software or settings that are normally restricted.
Supply-chain attack
Hackers tamper with a widely used software dependency, so thousands of unsuspecting enterprises install the compromised code in their own environments.
Suricata
A network-level security tool compares live traffic with known malicious or suspicious signatures, optionally blocking the traffic or generating alerts.
Switch
Data arrives on one port and is forwarded only to the correct destination port, lowering collisions and improving efficiency over old-school broadcasting methods.
Symmetric encryption
Two parties share a single secret passphrase for both locking and unlocking messages, requiring trust that each keeps the key safe.
Synchronize (SYN) flood attack
Machines flood a server with handshakes, never completing them, tying up resources and causing legitimate requests to languish or fail.
Syntax
Coding instructions must adhere to grammar-like rules; missing a brace or semicolon often prevents the compiler or interpreter from proceeding.
Syntax error
A script that forgets to close a bracket fails immediately, highlighting a structural mistake in the code’s layout.
Tailgating
An outsider slips in behind an authorized staff member at a secured doorway, bypassing the requirement to scan or show personal credentials.
TCP/IP model
A four-layer framework simplifies how data travels from physical signals to application-level transmissions, enabling universal compatibility across networks.
tcpdump
An admin uses text-based capture to watch packets on an interface in real time, diagnosing slow connections or suspicious activity.
Technical skills
Configuration of specialized security tools, programming response scripts, or analyzing logs are notable proficiencies vital in many IT and security roles.
Telemetry
Endpoints forward usage patterns or threat alerts to a central system, helping IT staff see real-time status across the entire environment.
Threat
A malicious group that actively scans for outdated software to exploit highlights the looming potential danger to unpatched hosts.
Threat actor
A well-funded entity systematically develops advanced intrusion techniques, targeting governments or corporations with stealthy infiltration attempts.
Threat hunting
Security experts proactively comb through logs, memory, and networks, unearthing malicious patterns that automated systems haven’t flagged yet.
Threat intelligence
An organization receives updates on new phishing tactics or zero-day exploits from external feeds, adjusting defenses before direct attacks hit.
Threat modeling
Developers brainstorm possible attacker motives, methods, and data targets, then incorporate design choices to reduce the worst risks upfront.
Transferable skills
A nurse entering security can repurpose meticulous record-keeping, attention to detail, and high-stakes responsibility to excel in incident response and compliance.
Transmission Control Protocol (TCP)
A stable connection ensures data arrives in the proper sequence, re-sending any lost segments to maintain accurate transfers.
Triage
A flood of security alerts are sorted by priority, investigating the highest-risk incidents first to mitigate damage efficiently.
Trojan horse
A disguised application claims to do a useful task but also installs a hidden backdoor, allowing remote infiltration behind the scenes.
True negative
A scanning tool checks a system believed to be secure and finds nothing malicious. Subsequent inspections confirm the assessment was correct.
True positive
An alert that certain inbound traffic is malicious proves accurate after investigation, preventing a potentially damaging infiltration.
Tuple data
A small, fixed group of items is stored in a structure where elements can’t be replaced or reordered once established.
Type error
An attempt to blend text with numerical expressions halts execution because the program expects consistent data formats for those operations.
Ubuntu
A well-known system variant offers a user-friendly interface, community support, and stable updates suitable for desktops or servers.
Unauthorized access
Someone logs into an area they lack rights for by using borrowed credentials, bypassing intended protections and potentially viewing or modifying data improperly.
Uncontrolled zone
Everything beyond the internal firewalls is considered unpredictable or potentially hostile, requiring extra caution when exchanging data.
Unified Extensible Firmware Interface (UEFI)
On newer machines, a more flexible approach than older boot routines decides hardware initialization, security checks, and the next steps in loading the OS.
USB baiting
A flash drive labeled “Confidential Plans” left on a desk entices the curious, who inadvertently load the malicious code upon insertion into their workstation.
User
Anyone interacting with a computer system, whether a front-desk clerk or an administrator, must be accounted for in security planning.
User Datagram Protocol (UDP)
A quicker but less reliable method sends data without verifying every part arrived, often used in streaming or gaming scenarios.
User-defined function
A piece of code an author writes for a specific purpose—like formatting reports—can be called multiple times from different parts of a program.
User interface
A mobile app features clear icons and swipe gestures so individuals can accomplish tasks smoothly without learning complicated commands.
User provisioning
When new staff join a company, automated steps set up accounts and privileges so they can start work immediately without manual overhead.
Variable
A memory placeholder holds a changing piece of information, such as a running score, a user’s input, or a dynamic configuration value.
Virtual Private Network (VPN)
Team members connect to corporate resources remotely through a secure tunnel, preventing unauthorized parties from spying on sensitive communications.
Virus
Malicious code attaches to other files and spreads whenever they’re shared or executed, often harming data or system performance.
VirusTotal
Security teams upload questionable files to a multi-engine scanning service, comparing results from different antivirus solutions for thorough checks.
Vishing
An imposter calls, claiming urgent action from a bank or government office, hoping the target reveals private details like account pins or social security numbers.
Visual dashboard
Managers see a real-time overview of server loads, security alerts, and user statistics without diving into raw logs or technical readouts.
Vulnerability
A newly discovered flaw in a web plugin can allow someone to bypass login screens, potentially opening an unauthorized path into the site.
Vulnerability assessment
Automated scans and manual checks reveal software weaknesses, insecure configurations, or missing patches, ranking them by severity for prioritization.
Vulnerability management
A company methodically tackles found weaknesses by testing, applying updates, and monitoring for new issues, cycling through continuous improvement.
Vulnerability scanner
Automated software references a database of known flaws, probing devices to see if they match any exploitable conditions or missing patches.
Watering hole attack
A popular site frequented by a particular industry is sabotaged, hoping key professionals unknowingly install malicious code when they visit.
Web-based exploits
Threat actors trick a user into clicking a harmful link or loading a compromised page, taking advantage of unpatched browser flaws to run code.
Whaling
A high-level executive gets a customized extortion or wire-transfer scam referencing specific internal knowledge, aiming for a large payout from a single strike.
Wide Area Network (WAN)
A corporation ties together branches across the country, enabling shared resources and communication despite physical distance.
Wi-Fi Protected Access (WPA)
Modern wireless configurations require passphrases for encrypted sessions, significantly reducing eavesdropping or unauthorized usage of the network.
Wildcard
A search parameter such as *.pdf matches any file name that ends with .pdf, simplifying broad retrieval or command operations on multiple files at once.
Wireshark
An engineer inspects captured traffic data, identifying latency issues, protocol errors, or suspicious transmissions in a user-friendly graphical tool.
World-writable file
Any user on a shared system can alter a particular resource, potentially enabling sabotage or the introduction of harmful scripts if not monitored.
Worm
An automated malicious entity scans for vulnerabilities and copies itself, requiring no human interaction to leap from system to system.
YARA-L
Security researchers define rule sets that scan files or logs for specific textual or behavioral patterns consistent with advanced malware families.
Zero-day
A glitch in software is publicized before developers release an official fix, leaving users temporarily exposed to attackers exploiting the weakness.