My Glosarry
My Glosarry
3. Network Attacks
6. Wireless Attacks
7. Insider Threats
● Symmetric Encryption: Uses the same key for encryption and decryption (e.g., AES).
● Asymmetric Encryption: Uses public and private key pairs (e.g., RSA, ECC).
● Hashing: One-way function for data integrity (e.g., MD5, SHA-256).
● Digital Signature: Validates authenticity and integrity of a message.
● Certificate Authority (CA): Issues and manages digital certificates.
● Public Key Infrastructure (PKI): Framework for managing keys and certificates.
● Elliptic Curve Cryptography (ECC): Lightweight encryption for resource-constrained
devices.
● Perfect Forward Secrecy (PFS): Ensures session keys can't be reused or decrypted
later.
● Steganography: Hiding data within files or images.
5. Risk Management
6. Network Security
8. Physical Security
9. Emerging Technologies
An IP address is like the home address of a device on a network. It helps devices find each
other and communicate. There are two types:
2. Firewall
A firewall is like a security guard for your network. It decides what data can enter or leave your
system based on rules you set, blocking harmful or unwanted traffic.
A VPN is like a secure tunnel for your internet traffic. It hides your IP address and encrypts
your data, keeping it safe from hackers or spying while using the internet.
4. Malware
Malware is any harmful software (like a virus, worm, or trojan) designed to damage or steal
data from your computer. It's like a spy or thief attacking your system.
5. Encryption
Encryption is like a secret code that makes your data unreadable to anyone who doesn’t have
the key to decode it. It protects sensitive information, like passwords and credit card details.
6. Phishing
Phishing is when a hacker tries to trick you into revealing personal information (like your
password or bank details) by pretending to be a trustworthy entity (like your bank). It's like a
fake message that looks real.
7. Authentication
Authentication is the process of verifying your identity, like showing an ID to prove who you
are. It can involve:
8. Access Control
Access control is like setting permissions on your house doors. It decides who can enter (or
access) specific parts of your network or system based on roles, such as:
A SIEM is like a security camera system that watches over your network. It collects data from
various sources to identify possible security threats and respond to them quickly.
● IDS is like a watchdog that looks for suspicious activity and alerts you when
something’s wrong.
● IPS is a watchdog that also takes action to stop the attack.
2FA adds an extra layer of security by requiring two forms of verification before you can
access your account. It’s like needing both a key and a password to open a door.
12. Backup
A backup is like making a copy of important files or data in case something goes wrong, like
losing your files or getting attacked by ransomware.
13. Vulnerability
A vulnerability is like a weak spot in your system that hackers can exploit to cause damage,
steal data, or take control.
A DDoS attack is when many computers are used to flood a system with traffic, making it slow
or crash. It’s like overloading a website by having too many people visit at once.
A zero-day vulnerability is a flaw in a system that’s unknown to the software maker. Hackers
exploit it before the vendor can release a fix. It's like a hidden door in your house that a thief
finds before you even realize it exists.
16. Ransomware
Ransomware is a type of malware that locks you out of your files or system and demands
payment to unlock them. It’s like a kidnapper holding your files for ransom.
17. Endpoint
An endpoint is any device (like a computer, smartphone, or printer) connected to a network. It’s
like the entry point for data and attacks.
18. Hashing
Hashing is like turning a word into a unique code (a hash). It's commonly used to store
passwords in a way that they can't easily be reversed back into the original word.
Patch management is like fixing holes in your house to prevent intruders. It involves updating
software to close security vulnerabilities.
Social engineering is when a hacker manipulates people into breaking security rules, often by
pretending to be someone trustworthy. It’s like a fraudster tricking you into handing over your
house keys.
21. Cryptography
Risk management is the process of identifying, assessing, and mitigating risks to your
network or system. It’s like creating a plan to avoid potential threats.
23. Ports
A port is like a door on a computer or server that allows it to communicate with other devices
over a network. Each port is associated with a specific service or application, such as web
browsing, file transfer, or email.
For example:
● Packet Filtering Firewall: Inspects packets of data and decides to allow or block based
on predefined rules.
● Stateful Inspection Firewall: Monitors active connections and ensures the packet is
part of an established session.
● Proxy Firewall: Acts as an intermediary between a user and the service they want to
access, hiding the user's internal network.
SIEM systems collect and analyze security data from different devices and software. They
provide:
NAC solutions ensure that only devices meeting specific security criteria (e.g., antivirus, patch
level) can access the network. It’s like a gatekeeper that only lets secure devices in.
Patches are updates to software that address vulnerabilities. Patch management ensures that
patches are applied in a timely manner to avoid exploitation of known vulnerabilities.
Cloud computing offers benefits, but security is crucial. Important concepts include:
● DAC (Discretionary Access Control): The owner of the resource determines access
rights.
● MAC (Mandatory Access Control): Access rights are assigned based on classification
or security level.
● RBAC (Role-Based Access Control): Access is assigned based on roles within an
organization.
● IDS (Intrusion Detection System): Detects potential security threats but does not take
action (like an alarm).
● IPS (Intrusion Prevention System): Detects and actively blocks potential threats in
real-time.
● Brute Force Attack: Trying many possible passwords or keys to break into an account.
● Man-in-the-Middle (MitM) Attack: Intercepting communications between two parties to
steal information.
● Cross-Site Scripting (XSS): Inserting malicious scripts into web pages that can affect
users.
● Cross-Site Request Forgery (CSRF): Tricking a user into executing unwanted actions
on a web application.
DLP is a strategy to ensure sensitive data is not lost, misused, or accessed by unauthorized
users. It involves monitoring and controlling data flow across networks, email, and other
communication channels.
BCP ensures an organization’s critical functions can continue during and after a disaster. It
includes:
● Vulnerability Scanning: Automated tools that search for known vulnerabilities without
exploiting them.
● Penetration Testing: A manual or automated attempt to exploit vulnerabilities to see
how far an attacker can get into the system.
41. Disaster Recovery
A Disaster Recovery Plan (DRP) outlines procedures for recovering systems and data in case
of a disaster. It includes:
42. SSL/TLS
SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are cryptographic protocols
used to secure communications over the internet, especially for websites (HTTPS).
43. Honeypots
A honeypot is a decoy system designed to attract and trap potential attackers to study their
tactics and protect real systems.