Keywords from Luke Flashcards
CIA Triad
A security model focusing on Confidentiality, Integrity, and Availability.
Ethical Hacker
An individual who exploits systems legally and ethically to find vulnerabilities.
Cyber Security Researcher
Professionals studying digital threats and security measures.
Controls
Security measures to mitigate risk.
Internetworked Information Systems
Integrated systems that share data and resources.
TLA
Three-Letter Acronym, typically referring to security protocols.
Advanced Persistent Threats (APT)
Long-term targeted cyber attacks.
5 Eyes
An intelligence alliance comprising five Anglophone countries.
Google Dork
A search string for finding specific data using Google.
Operation Aurora
Google’s cybersecurity incident in 2009.
IR - Incident Responder
A professional dealing with cybersecurity incidents.
Playbook
A strategic outline for cybersecurity operations.
ACSC & JCSC
Australian Cyber Security Centre and Joint Cyber Security Centres respectively.
Zero Trust
Security model that does not inherently trust any entity.
Control
Mechanisms that enforce policy within systems.
Attribution
Identifying the origin of a cyberattack.
Sec Ops
Security Operations, often involved in maintaining day-to-day security.
Signal Intelligence (SigInt)
Collection and analysis of electronic signals and communications by other nations.
0-day
A software vulnerability that is unknown to those who should be interested in its mitigation.
C2 Servers (C & C)
Command and Control servers used by attackers to maintain communications with compromised systems.
Hack Back
Act of hacking against an entity that has attacked you first.
Systems of National Significance
Important infrastructures whose compromise can affect national security.
Ransomware
Malware that encrypts files and demands payment for their release.
Exfiltrate Data
Unauthorized copying, transfer or retrieval of data.
Confidentiality, Integrity, Availability (CIA Triad):
Three fundamental principles of information security.
DOS/DDOS Attacks
Denial of Service and Distributed Denial of Service attacks to make a machine or network resource unavailable.
Elastic Computing
The ability to acquire computing resources on demand and to scale.
TCP, UDP, SSL/TLS
Protocols for transmitting data over the Internet.