Please enable JavaScript to use CodeHS

Cyber Glossary

Flashcards

Course:

Module:

Search:

Cybercrime General

Identity theft, stealing money, stealing private information, controlling private computers.

Ransomware General

Ransomware is a type cyber attack that threatens to publish the victim's data or block access to it unless a ransom is paid.

Internet of Things General

The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.

Cybersecurity General

Protection of computer systems, networks, and data from digital attacks.

Cybersecurity General

Protocols for encrypting/decrypting information. Most cybersecurity breaches happen due to human error, not software bugs.

Computer Science General

The study of computational thinking, the thinking humans need to in order to describe a step by step process to a computer.

Phishing General

The usage of deceptive emails and websites to maliciously gather personal information

CIA Triad General

The CIA Triad is a widely-accepted security measure that should be guaranteed in every secure system. It stands for Confidentiality, Integrity, and Availability.

Confidentiality General

The protection of information from people who are not authorized to view it.

Integrity General

Aims at ensuring that information is protected from unauthorized or unintentional alteration.

Availability General

The assurance that systems and data are accessible by authorized users when and where needed.

Data privacy General

how company's use your data

Data security General

protecting your data online

https General

secure data transfer protocol when on the internet

Privacy Policy General

Legal document outlining how a company can collect and use your data

Black Hat Hacking General

attempting to find computer security vulnerabilities and exploit them for personal financial gain or other malicious reasons

White Hat Hacking General

a computer security specialist who breaks into protected systems and networks to test and assess their security

Digital Footprint General

The information about a particular person that exists on the Internet as a result of their online activity

Cyberbullying General

the use of electronic communication to bully a person

Information Literacy General

Information literacy is having the ability to find information, evaluate information credibility, and use information effectively.

Copyright General

A law that grants the creator of an original work exclusive rights to its use, distribution, and sale

Public domain General

Objects in the public domain are not subject to copyright laws, and thus may be freely used by the general public.

code General

A term used in programming for the set of instructions that can be run or executed by a computer.

interpreted language General

Translates and executes program code line by line into machine code.

compiled language General

Translates, or “compiles” the entire code into machine code and then runs the program, or sets aside to run later.

markup language General

Uses tags to format and define elements within a document. The tags are not shown when the document is displayed.

query language General

Used to make queries, or searches, in databases and information systems.

Assembly Language General

A programming language that is very close to machine code and used for a specific type of processor.

scripting language General

Uses a series of commands within a file that is capable of being executed without being compiled.

variable General

An identifier that stores data or information and can be changed at any time.

constant General

An identifier that stores data or information and cannot be changed.

integer General

A number can be positive, negative, or zero WITHOUT a decimal component. -50; 0; 5

float General

A number can be positive, negative, or zero WITH a decimal component. 3.2; 0.0; 4.5652

string General

Contains text or a sequence of letters, numbers, punctuation, spaces, etc. "Hello, world!"; "abc123"

char General

Contains a single character or punctuation. a; z; 1; !; #

Boolean General

Binary and evaluates to either true or false. true; false

Define a Function JavaScript

Defining a function means to teach the computer a new command and explain what it should do when receiving that command.

Define a Function

Call a Function JavaScript

Calling a function actually gives the command, so the computer will run the code for that function.

Call a Function

Pseudocode General

A set of steps that uses the structural conventions of programming but is intended for human reading.

Comments General

Phrases entered into code to provide information or direction.

Flow Chart General

A diagram made up of shapes and arrows used to display the order of steps in a program or process.

Condition General

A condition is code that you put inside an if statement or while-loop.

Condition

If Statement General

An if statement lets you ask a question to the program and only run code if the answer is true.

If Statement

If Else Statement General

Control structure that lets us run either one section of code or another depending on a test.

If Else Statement

Control Structure General

A control structure lets us change the flow of the code.

Control Structure loops if statements

Selection General

Using a condition to determine which part of an algorithm is executed.

Loop General

A loop is a way to repeat code in your program.

Loop

For Loop JavaScript

A for loop lets us repeat code a **fixed number of times**.

For Loop

While Loop General

Lets us repeat code as long as something is true.

While Loop

array General

A fixed container that stores an ordered collection of items.

vector General

A resizable container that stores an ordered collection of items.

object General

Can store combinations of keys and values where the value can be accessed by its associated key.

properties of an object General

The variables that are attached to the object.

attributes of an object General

An object’s characteristics.

methods of an object General

Defines what an object can do.

Caesar Cipher General

An encryption method in which each letter of the message is shifted by a certain amount, called the key

Enigma General

A physical machine used in WWII that built on the complexity of substitution ciphers.

Vigenère Cipher JavaScript

An encryption method that uses a series of interwoven Caesar ciphers based on the letters of a keyword

Cryptography General

Scrambling digital information into an unreadable form. Only those with verified authority (password, key, etc) can unscramble it to read it.

Cryptanalysis General

The process of decrypting coded messages without being told the key.

Cryptology General

The practice of solving and writing encryptions

operating system (OS) General

The primary software that runs applications and manages all the hardware, memory and other software on a computer.

software General

A set of computer instructions that tells the computer how to work.

workstation OS General

Most commonly used on a desktop or laptop computer and can perform many tasks without an internet connection.

mobile OS General

An operating system used on mobile devices, such as a mobile phone or tablet.

server OS General

Used on specialized computers that take in requests and send back a response (mail server, web server, etc).

embedded OS General

Will only perform one type of task and are used in machines such as an ATM or a GPS system.

firmware General

An operating system that is permanently etched into a hardware device such as a keyboard or a video card.

hypervisor General

Operating systems that are most commonly used to run multiple operating systems on a computer system at the same time.

platform General

An operating system such as Windows, Mac OS, Android or iOS.

single-platform software General

Software that only works on one platform, such as only on Android phones, or only on Mac computers.

cross-platform software General

Software that works on multiple platforms.

user account General

Used to log in to a computer, comprised of a username, password, personalized settings and set permissions.

admin account General

Has full access and full control to manage other users, set permissions and change computer settings and programs.

user permissions General

Authorization given to user accounts that grants them certain privileges and enables them to access specific folders and files.

host account General

The main, controlling account responsible for providing security updates, antivirus software and setting permissions for anyone on the same network.

security baseline General

An agreed upon set of rules and permissions.

authorization General

Specifying access rights and permissions for each user.

authentication General

Proving the identity of the user.

Linux General

An open-source and community-developed operating system.

Apple Macintosh (macOS) General

An operating system that uses a graphical user interface designed by Apple Inc. for use on desktops and laptops.

Microsoft Windows General

An operating system that uses a graphical user interface designed by Microsoft for use on desktops and laptops.

file system General

A method of organizing files and retrieving them from storage.

file management General

Software that manages data and files along with the ability to create, modify, and move these files.

GUI (graphical user interface) General

A type of interface that uses interactive graphical elements such as windows, buttons, and icons.

patches General

Updates that address and fix security vulnerabilities within a program or product.

computer virus General

A type of computer program that can spread by modifying other computer programs and inserting its own code (rules).

backup General

A copy or snapshot of the state of your computer.

full backup General

Backs up everything on your computer.

incremental backup General

Backs up only what has changed since the last backup.

browser General

Used to navigate the world wide web and view HTML files.

cache General

A collection of data and files used to increase the speed of the browser.

client-side scripting General

Program code, usually written in JavaScript, that is executed on the client's browser.

proxy server General

An intermediary between the user and the Internet that takes requests from the user and returns a response.

certificate General

Confirms the identity and authenticity of a website.

command line interface (CLI) General

Processes commands to a computer program in the form of lines of text.

file extension General

The suffix at the end of a filename that indicates what the type of file.

processor General

The electronic part of a computer that executes the instructions that are passed to it by the operating system. It’s also called a CPU, or central processing unit.

software license General

Legally binding guidelines for use and distribution of software.

open source software General

Software that is available for anyone to access and modify.

proprietary software General

Software that is owned by an individual or company.

application architecture model General

Refers to the design of the essential parts of an application and how they are connected to each other.

locally installed software General

Software installation that is performed on your local computer.

local network hosted General

Software installation that is performed on a local area network (LAN).

cloud hosted General

Software that is installed, hosted and accessed entirely from a remote server or location.

OWASP General

Open Web Application Security Project; highly-regarded organization and much used by cybersecurity professionals.

SQL Injection (SQLi) General

refers to an injection attack wherein an attacker can execute malicious SQL statements (also commonly referred to as a malicious payload) that control a web application's database server (also commonly referred to as a Relational Database Management System – RDBMS).

SQL General

Structured Query Language; Programming language for managing and querying data from a relational database.

Query General

A question (noun) or to ask a question (verb) - often in relation to a database.

Schema General

How we define what is stored in a table.

Column General

Represents a piece of information (or attribute).

Table General

A set of data elements (values) using a model of vertical columns (shown by a name) and horizontal rows (fields), the cell (record) being the unit where a row and column intersect. A table has a specified number of columns by design, but can have any number of rows.

Row General

One entry in a table. Each row has an ID that is unique to the table.

Select General

A statement in SQL that allows you to ask for a row or multiple rows from a table in a database.

Where General

a clause in SQL that allows you to filter results of s SELECT with certain conditions.

Error-based SQLi General

An injection risk where the website returns errors that the hacker can use to explore the database more. This is the first clear test that an attacker can use to test to see if a site is vulnerable. It is usually displayed as an unhandled internal exception error. This info is meant for the developer and is not meant to go back and deliver it to a person’s webpage.

Union-based SQLi General

An injection risk where the attacker can add a condition that’s always true, like 1=1, often by appending it to the query to pull up even more in a results set. This fundamentally changes the query and can allow someone to pull the entire contents of the database.

Blind SQLi General

Often used when error-based and union-based SQLi do not work. It essentially involves asking the database a series of targeting questions and based on the results gives clues as to how to get the DB to give up its contents.

Protocol General

A set of rules or procedures for transmitting data between electronic devices. In order for computers to exchange information, there must be an agreement as to how the information will be structured and how each side will send and receive it.

Network General

A group of two or more computer systems linked together.

Bitrate General

The amount of data (in bits) that can be sent in a fixed amount of time.

Bandwidth General

The capacity of data transfer in a system. Measured by bitrate.

Latency General

The latency of a system is the time it takes for a bit to travel from sender to receiver. Fiber optic cables have low latency.

IPv6 General

A new 128 bit version of the Internet Protocol.

IP (Internet Protocol) General

The protocol that defines the payout of an an Internet address.

Domain Name System (DNS) General

Used to translate domain names into IP addresses.

Routing General

The process of sending data between two computers on the internet. The data is sent through routers that determine the route.

Redundancy General

When multiple paths exist between two points. This improves reliability and makes the internet fault tolerable. Makes the routing system scalable.

HTML Documentation HTML

Documentation and syntax for HTML

html docs html documentation

Packets General

Packets are the units of data that are sent over the network.

Metadata General

a set of data that describes and gives information about other data.

Internet Protocol (IP) General

Standardizes the layout of all packets. All packets must have a destination IP address, a from IP address, and the actual data being sent. Defines the layout of a SINGLE packet.

Transmission Control Protocol (TCP) General

Allows for sending MULTIPLE packets between two computers. TCP checks that all packets arrived and can be put back in the proper order. The metadata must include a destination IP address, a from IP address, the message size and the packet order number.

HTTP (HyperText Transfer Protocol) General

Protocol that standardizes the language for talking to web servers to send and receive web resources. Defines how computers send and receive hypertext information. (HTTPS: The “S” denotes a secure connection using HTTP.)

URL General

Stands for Uniform Resource Locator. You are locating a resource that exists somewhere on the internet.

number system General

Defines how numbers are represented, which digits are used, and what each position (place) in a number means.

binary number system General

A number system that only uses two symbols: typically "0" and "1".

hexadecimal numeral system General

A number system that uses 16 symbols: 0-9 and A-F

bit General

A basic unit of information in computing and digital communications.

motherboard General

A circuit board with ports and sockets used to connect the main devices of a computer.

BIOS General

A special kind of firmware that runs programs strictly to start up your computer.

central processing unit (CPU) General

The core component of a device that accepts and executes instructions.

random access memory (RAM) General

A fast type of computer memory which temporarily stores all the information your device needs right away.

solid-state drive (SSD) General

A fast access storage device used in computers.

graphics processing unit (GPU) General

A component designed to speed up the creation of images and output them to a display device, like a monitor.

network interface card (NIC) General

A component with a built in wired network port that allows the computer to connect to a network.

network port General

A location where information is sent from one computer to another.

port scan General

Checks to see which ports on a network are open.

firewall General

A device or software that blocks unwanted Internet traffic while allowing legitimate traffic.

plug-and-play device General

A device that will be recognized by your computer and install on its own.

driver General

A group of files that allows a device to communicate with the computer’s operating system.

Bluetooth General

A short-range wireless communication technology that uses radio waves to transmit information.

NFC (Near Field Communication) General

Enables short-range communication between compatible devices.

network device General

An electronic device which is required for communication between devices.

network adapter General

An internal component of a computer that is used for communicating over a network.

modem General

A network device that allows a device to connect to the Internet.

switch General

Enables wired connections between more than one computer or device.

access point General

A network device that allows other Wi-Fi devices to connect to a wired network.

router General

An access point that allows for network management and security configuration.

volatile storage General

Storage that is available only while the system is on and disappears when the system is turned off.

non-volatile storage General

Storage that is saved and available even when the system is shut down.

network-attached storage (NAS) General

Storage that contains one or more drives that can be accessed over a network.

file server General

Network attached storage that is equipped with powerful network adapters.

WLAN General

A wireless LAN that uses radio frequency technology to send and receive data.

VLAN General

A virtual LAN that allows for the setup of separate networks by configuring a network device.

wireless networking standards General

A set of protocols that specify how your Wi-Fi network and other data transmissions work.

command line interface (CLI) General

Processes commands to a computer program in the form of lines of text.

routing table General

A list of specific routing destinations; essentially a map for the router.

forensics General

The use of science or technology in the investigation and collection of evidence in a court of law.

digital forensics General

The use of digital media from a computer, mobile phone, server or network as evidence in a court of law.

chain of custody General

Ensures an unbroken audit trail of collected digital data and media.

log file General

A file that records events that occur in an operating system (or other software) and/or messages between different users of a communication software.

metadata General

Data about data.

memory image General

A snapshot of all information captured in a system’s Random Access Memory (RAM).

ORDER BY General

A SQL clause that sorts the returned query results by one or more columns

ASC General

Ascending order; the default sort direction

DESC General

Descending order; used to reverse the default sorting

JOIN General

A SQL operation that combines rows from two or more tables based on a related column.

Cross Join General

A join where each row in one table is paired with every row in another.

Foreign Key General

A field in one table that refers to the primary key in another table.

Alias General

A temporary name assigned to a column or table using the `AS` keyword in SQL

AS General

A SQL keyword used to rename fields or tables in the query result

HTML HTML

Hypertext Markup Language

HTML

HTML Tag HTML

Tags are the building blocks of an HTML document

Tag

Indentation General

Indentation is the visual structure of how your code is laid out. It uses tabs to organize code into a hierarchy.

Hyperlink HTML

The connection between one HTML page to another HTML page

<img> Tag HTML

Allows adding an image to a web page. It is self-closing. The attributes of an `<img>` tag include `src`, which specifies where to get the image from (the url for an image ), and `width` and `height` attributes, which specify the size of the image in pixels.

HTML Lists HTML

Way to organize information with a simple structure that is easy to read and write on a webpage. There are ordered and unordered HTML lists.

<ul> Tag HTML

Defines an unordered list in HTML.

<li> Tag HTML

defines a list item inside an HMTL list.

HTML Tables HTML

Tables display information in a grid.

Style Attribute HTML

Allows adding several different types of styles to HTML elements.

CSS CSS

Cascading Style Sheets. The language for designing web pages and adding style.

Selector CSS

Defines which HTML elements a CSS rule applies to.

Class Attribute HTML

`class` is an attribute we can add to HTML tags in order to style a specific group of elements.

id Attribute HTML

`id` is an attribute we can add to an HTML tag to style that specific element.

risk assessment General

The process of identifying, assessing and prioritizing potential risks for an organization or company.

vulnerability scan General

Designed and used to assess computers, networks or applications for known weaknesses.

packet sniffing General

The practice of gathering, collecting, and logging some or all packets that pass through a computer network.

race condition General

A situation when a device or system has two or more operations running at the same time that must be completed in proper sequence.

buffer overflow General

A situation when too much data is placed into a fixed-sized buffer that can cause data corruption.

integer overflow General

When a value higher than the maximum or lower than the minimum is used which can result in logic errors.

penetration test General

When a company hires a white hat hacker to assess the security of a system by finding and exploiting vulnerabilities.

passive reconnaissance General

Collecting information about a target without directly accessing the system (social media, news, website, etc).

active reconnaissance General

Collecting information about a target by actively engaging a system and analyzing responses (network and port scans).

initial exploitation General

When the tester is first able to gain access into the target system.

pivot General

Using a compromised trusted system to gain access to a target system within the same network.

escalation of privilege General

Using tools to gain higher levels of privilege.

black box pen test General

When the tester has no knowledge of the target system (simulates an external attack).

white box pen test General

When the tester has intimate knowledge of the target system (simulates an internal attack).

gray box pen test General

When the tester is limited knowledge of the target system.

qualitative risk assessment General

Risk assessment that gives a numerical (typically monetary) value to the impact of a threat occuring.

single loss expectancy (SLE) General

How much money could be lost at any one time which is determined by the formula: AV * EF + SLE

asset value (AV) General

How much an asset is worth.

exposure factor (EF) General

The amount of the asset that would be impacted (amount of time, % of data, etc) by a threat event.

annual loss expectancy General

How much can be expected to be lost in a year due to a single threat event which is determined by the formula: SLE * ARO = ALE

annual rate of occurrence (ARO) General

How often a threat event per year (typically determined by historical data).

qualitative risk assessment General

Risk assessment that defines an event’s level of risk in words rather than numbers which is determined by the potential level of impact and the likelihood of occurrence.

risk avoidance General

Risk response that removes the risk by avoiding the behavior completely.

risk transfer General

Risk response that shares the responsibility of the risk with someone else.

risk acceptance General

Risk response that accepts the risk as is.

risk mitigation General

Risk response that takes steps to avoid the risk or minimize the impact or likelihood.

Symmetric Encryption General

The same key is used to encrypt and decrypt (e.g., Caesar, Vigenere)

Asymmetric Encryption General

One key encrypts, a different key decrypts.

Public Key Encryption General

Public key encryption is a type of asymmetric key encryption. There’s one key that encrypts the information and there is a different key that decrypts the information.

Digest General

The output from any input that has been processed through a hashing algorithm / function.

Hash Functions or Hashing General

The word hashing literally means to scramble. Hashing changes a message into an unreadable string of text for the purpose of verifying the message’s contents, but not hiding the message itself. It must be easy to compute the output (the digest) for any input, but hard to compute the input for any output. A hash function takes an input string of arbitrary length and produces a fixed- size, short output called a digest . It’s always the same length no matter how big the input is AND the output is always the same hash for any given input. Unlike symmetric and asymmetric algorithms, there are no “keys” in hashing functions.

Collisions General

whenever 2 inputs map to the same output.

Reverse-engineerable General

whenever you can work backwards through an algorithm (like a Caesar cipher)

Modulo Operation General

Finds the remainder after division of one number by another (sometimes called modulus). Example: 14 ➗ 4 = 3 remainder 2 14 mod 4 = 2 14 % 4 = 2

cryptography General

The science of protecting information by encrypting and transforming it into a secure format.

Symmetric Encryption General

When the same key is used to both encrypt and decrypt.

Asymmetric Encryption General

When one key encrypts and a different key decrypts.

substitution cipher General

Changes one character or symbol into another.

block cipher General

Groups bits into blocks of plaintext before applying the encryption.

transposition cipher General

Shifts the positions of plaintext character (or groups of characters) according to a regular system.

Data Encryption Standard (DES) General

A symmetric, block cipher that groups data into 65-bit blocks and uses a 56-bit key along with an algorithm and 16 rounds of encryption.

Advanced Encryption Standard (AES) General

A symmetric, block cipher that groups data into 128-bit blocks and uses a 128-, 192- or 256-bit key along with an algorithm and 10, 12, or 14 rounds of encryption.

key exchange General

A method in cryptography by which keys (public or private) are exchanged between two parties.

Diffie-Hellman key exchange General

One of the first asymmetric key implementations and was responsible for securing the exchange of keys.

man-in-the-middle attack General

Occurs when someone secretly intercepts communications between two parties by impersonating one or both parties.

RSA encryption General

The first widely used asymmetric algorithm used for both signing and encryption.

SSL certificate General

A small data file that digitally binds a public cryptographic key to an organization.

single SSL certificate General

Will secure one domain or subdomain.

wildcard SSL certificate General

Will secure one domain and an unlimited number of its subdomains.

multi-domain SSL certificate General

Will secure multiple domains.

root certificate General

Belongs to the Certificate Authority.

intermediate certificate General

Acts as a “middle-man” between the root certificate and the server certificate.

server certificate General

Issued to the domain.

stapling General

Allows a server to validate their own SSL certificate by bundling a time-stamped response signed by the certificate authority.

certificate pinning General

The process of associating a host with their expected certificate or public key.

JavaScript General

an object-oriented computer programming language commonly used to create interactive effects within web browsers.

Minified Code General

in computer programming languages and especially JavaScript, is the process of removing all unnecessary characters from source code without changing its functionality.

Database General

An organized collection of data (e.g., text, images, videos, audio, geospatial, tabular) An electronic system that allows data to be easily accessed, manipulated and updated via a Database Management System (DBMS).

Table General

A set of data elements (values) using a model of vertical columns (shown by a name) and horizontal rows (fields), the cell (record) being the unit where a row and column intersect. A table has a specified number of columns by design, but can have any number of rows.

Queries General

Let you quickly perform an action on a table in a database like apply changes or retrieve information.

Client Device General

Client devices are typically personal computing devices with network software applications installed that request and receive information over the network or Internet. Mobile devices like your smart phone, tablets, iPads, laptops and also desktop computers can can all function as clients.

Server Device General

Examples of servers include web servers, mail servers, and file servers. Each of these servers provide resources to client devices. Most servers have a one-to-many relationship with clients, meaning a single server can provide multiple resources to multiple clients at one time.

Client Application General

Client-server applications are programs or apps that run on our client devices AND need to access resources from a server. In other words, they need help and can’t do what they need to do alone.

Server Application General

A server computer program or application provides functionality for client programs or devices. So a single overall computation is distributed across multiple processes or devices. Servers can provide various functionalities, often called "services", such as sharing data or resources among multiple clients, or performing computation for a client.

Front-end General

Client devices and applications are often referred to as the “front end” - meaning what the user actually sees.

Back-end General

Server devices and applications are often referred to as the “back end” - meaning the user doesn’t actually SEE what is happening; it’s hidden from their view and they just see the results on their end.

Client-server model General

Clients and servers communicate over a computer network on separate hardware, but both client and server may reside in the same system. A server host runs one or more server programs which share their resources with clients. A client does not share any of its resources, but requests a server's content or service function. Servers store and protect data and process requests from clients. Clients make requests and format data on the device for the end user.

Data Visualization General

Using charts, graphs, or images to visualize complex data.