Please enable JavaScript to use CodeHS

Cyber Glossary

Flashcards

Course:

Module:

Search:

Privacy Policy General

Legal document outlining how a company can collect and use your data

personally identifiable information General

any data that can be used to identify an individual, such as their name, address, or social security number

Information Literacy General

Information literacy is having the ability to find information, evaluate information credibility, and use information effectively.

Artificial Intelligence General

A computer system able to perform tasks that ordinarily require human intelligence

Deepfake General

a video or image of a person in which their face or body has been digitally altered so that they appear to be someone else, typically used maliciously or to spread false information.

Internet of Things General

The Internet of Things (IoT) is the network of physical devices, vehicles, home appliances, and other items embedded with electronics, software, sensors, actuators, and connectivity which enables these things to connect and exchange data.

Confidentiality General

The protection of information from people who are not authorized to view it.

Integrity General

Aims at ensuring that information is protected from unauthorized or unintentional alteration.

Availability General

The assurance that systems and data are accessible by authorized users when and where needed.

Non-Repudiation General

Ensures that one cannot deny having sent or received a message.

Vulnerability General

A flaw or weakness in a system or device.

Risk General

The potential for loss when an attack happens.

Threat JavaScript

A potential for a cybercriminal to exploit a vulnerability.

Authentication General

The process of identifying a user and granting them access. Authentication is proving that someone is who they say they are.

Authorization JavaScript

The process of enforcing policies and user privileges. Once a user is authenticated, they may only be authorized to access specific areas or may only have rights to perform specific tasks.

Accounting General

The process of measuring what is happening within the system. This is the final process of the AAA framework and ensures that there is a log of all actions within the network or system.

Malware General

Any type of software that is designed to intentionally harm or damage a computer or network.

Virus General

A type of malware that attaches itself onto a host program, such as a document. It can cause serious damage to files or an entire device.

Ransomware General

A software that prevents users from accessing their files or network until a ransom is paid.

Spyware General

Once downloaded onto a user’s computer, the software secretly gathers information about a person or organization and sends it to the attacker.

Phishing General

A cybercrime in which a person is contacted by email, telephone or text message by someone who is posing as a legitimate company.

Firewall General

A network security device that monitors and filters incoming and outgoing network traffic.

Passphrase JavaScript

A type of authentication that is similar to a password but longer and is usually a sentence or a series of words

Two-Factor Authentication JavaScript

(2FA) A type of multifactor authentication that typically combines something the user knows (like a password) with something the user has (like a mobile phone)

Multifactor Authentication JavaScript

(MFA) An extra layer of authentication that requires two or more factors for authentication. Typically, these factors fall into three categories: something you know (password), something you have (such as a phone), or something you are (such as your fingerprint).

Biometric Authentication General

A form of authentication that uses an individual’s physical or behavioral characteristics to verify their identity

Password Manager General

Tools that store and manage passwords for various accounts, generating strong passwords and auto-filling login credentials.

Digital Footprint General

The information about a particular person that exists on the Internet as a result of their online activity

Cyberbullying General

the use of electronic communication to bully a person

Copyright General

A law that grants the creator of an original work exclusive rights to its use, distribution, and sale

Ethics General

The moral principle that governs a person's behavior.

Law General

refers to an external mechanism of control

Hacktivist General

A specific group of hackers who are motivated by their ideological views.

Cyberterrorists General

Have political motivations with the intent to harm, typically resulting in violence.

Nation State Hackers General

Sponsored by and funded by a government with the goal of giving their country a competitive advantage on a global scale.

Cryptography General

The practice of encrypting information so only authorized people can read it.

Encryption General

A process of converting information into an unreadable form to keep it secure from unauthorized access.

Brute Force General

The process of breaking an encryption by trial and error.

Symmetric encryption General

When the same key is used to both encrypt and decrypt.

Asymmetric encryption General

When one key encrypts and a different key decrypts.

Substitution Cipher General

A cipher that changes one character or symbol into another.

Block Cipher JavaScript

A cipher that groups bits into blocks of plaintext before applying the encryption.

Transposition Cipher General

A cipher that shifts the positions of plaintext character (or groups of characters) according to a regular system.

Digital Certificate General

A small data file that digitally binds a public cryptographic key to an organization.

Hash Function General

An algorithm used to change a message into an unreadable string of text for the purpose of verifying the information.

platform General

An operating system such as Windows, Mac OS, Android or iOS.

single-platform software General

Software that only works on one platform, such as only on Android phones, or only on Mac computers.

cross-platform software General

Software that works on multiple platforms.

user account General

Used to log in to a computer, comprised of a username, password, personalized settings and set permissions.

admin account General

Has full access and full control to manage other users, set permissions and change computer settings and programs.

user permissions General

Authorization given to user accounts that grants them certain privileges and enables them to access specific folders and files.

host account General

The main, controlling account responsible for providing security updates, antivirus software and setting permissions for anyone on the same network.

security baseline General

An agreed upon set of rules and permissions.

authorization General

Specifying access rights and permissions for each user.

authentication General

Proving the identity of the user.

patches General

Updates that address and fix security vulnerabilities within a program or product.

computer virus General

A type of computer program that can spread by modifying other computer programs and inserting its own code (rules).

backup General

A copy or snapshot of the state of your computer.

full backup General

Backs up everything on your computer.

incremental backup General

Backs up only what has changed since the last backup.

browser General

Used to navigate the world wide web and view HTML files.

cache General

A collection of data and files used to increase the speed of the browser.

client-side scripting General

Program code, usually written in JavaScript, that is executed on the client's browser.

proxy server General

An intermediary between the user and the Internet that takes requests from the user and returns a response.

certificate General

Confirms the identity and authenticity of a website.

command line interface (CLI) General

Processes commands to a computer program in the form of lines of text.

software license General

Legally binding guidelines for use and distribution of software.

open source software General

Software that is available for anyone to access and modify.

proprietary software General

Software that is owned by an individual or company.

application architecture model General

Refers to the design of the essential parts of an application and how they are connected to each other.

locally installed software General

Software installation that is performed on your local computer.

local network hosted General

Software installation that is performed on a local area network (LAN).

cloud hosted General

Software that is installed, hosted and accessed entirely from a remote server or location.

Form Factor General

The size, shape, and physical specifications of any physical aspect of a computer system.

Bit General

Bit means "binary digit". A bit is a single digit in a binary number. A bit can either be 0 or 1.

Byte General

A byte is 8 bits.

Binary Number System General

Number system that has 2 digits, 0 and 1. This is how computers represent numbers at the base level.

Transistor General

A semiconductor device used to amplify or switch electronic signals and electrical power, functioning as an on/off switch in computing

Encode General

The process of converting information or data into a specific format that can be understood or processed by a computer.

IPv6 General

A new 128 bit version of the Internet Protocol.

IP (Internet Protocol) General

The protocol that defines the payout of an an Internet address.

Protocol General

An agreed upon set of rules that outlines how to communicate or send information.

IPv4 General

The original 32 bit IP protocol that was created in the 1980s.

URL General

Stands for Uniform Resource Locator. You are locating a resource that exists somewhere on the internet.

Domain Name System (DNS) General

Used to translate domain names into IP addresses.

HTTP (HyperText Transfer Protocol) General

Protocol that standardizes the language for talking to web servers to send and receive web resources. Defines how computers send and receive hypertext information. (HTTPS: The “S” denotes a secure connection using HTTP.)

IP Address General

The unique address that is assigned to each device connected to the internet. It is part of the Internet Protocol.

Web Server JavaScript

A computer that stores web pages and makes them available to users on the internet.

Routing General

The process of sending data between two computers on the internet. The data is sent through routers that determine the route.

Transmission Control Protocol (TCP) General

Allows for sending MULTIPLE packets between two computers. TCP checks that all packets arrived and can be put back in the proper order. The metadata must include a destination IP address, a from IP address, the message size and the packet order number.

router General

An access point that allows for network management and security configuration.

Fault-tolerant General

a system that will operate with no interruption when one or more of its components fail

Hop General

When data is passed from one network segment to another.

Hop Count General

The number of hops it takes for data to get to its final destination.

ARPANET General

Advanced Research Projects Agency Network, precursor to the modern internet

User Datagram Protocol (UDP) General

UDP is often used in real-time applications where timely delivery of data is more important than the accuracy of delivery. UDP does not number the packets and it does not retransmit packets that are lost.

ASCII General

ASCII is the standard protocol for encoding text information as bits. The ASCII table assigns a unique binary number to every text character.

Unicode General

Unicode is a system that lets computers show and use all kinds of characters from different languages and writing systems around the world.

Kilobyte General

A kilobyte (kB) is 2^10 bytes (1024 bytes) of binary data.

Megabyte General

A megabyte (MB) is 2^20 bytes (1024 kB) of binary data.

Gigabyte General

A gigabyte (GB) is 2^30 bytes (1024 MB) of binary data.

Pixel General

Images are made up of pixels, which are essentially a grid of values. Each value, or pixel, encodes the color at that position in the image.

RGB Color Encoding General

The RGB encoding scheme allows us to encode colors as numeric data. It defines the amount of Red, Green, and Blue light in a pixel. Each color channel can have a value between 0 and 255.

Terabyte General

A terabyte (TB) is 1024 GB of binary data.

Internet General

A philosophy of making information and knowledge open and accessible to all people. A network of networks built on open, agreed upon protocols.

Wired Network General

A network where devices are connected via physical cables.

Wireless Network General

A network where devices connect without physical cables, typically using radio waves.

Modulation General

The process of varying a signal to transmit data.

Submarine Cables General

Undersea cables used for transmitting telecommunications signals across oceans.

Vint Cerf General

A computer scientist known as one of the "fathers of the internet."

Protocol General

A widely agreed upon set of rules that standardize communication between machines.

OSI Model General

A conceptual framework used to understand and standardize the functions of a telecommunication or computing system without regard to its underlying internal structure and technology.

Layer General

A distinct level in a networking framework that carries out specific functions.

Computing Solutions General

Computing solutions are solutions to problems that involve the use of a computer system. This can be either a hardware, software, or combination of the two.

motherboard General

A circuit board with ports and sockets used to connect the main devices of a computer.

BIOS General

A special kind of firmware that runs programs strictly to start up your computer.

central processing unit (CPU) General

The core component of a device that accepts and executes instructions.

random access memory (RAM) General

A fast type of computer memory which temporarily stores all the information your device needs right away.

solid-state drive (SSD) General

A fast access storage device used in computers.

graphics processing unit (GPU) General

A component designed to speed up the creation of images and output them to a display device, like a monitor.

network interface card (NIC) General

A component with a built in wired network port that allows the computer to connect to a network.

network port General

A location where information is sent from one computer to another.

port scan General

Checks to see which ports on a network are open.

firewall General

A device or software that blocks unwanted Internet traffic while allowing legitimate traffic.

plug-and-play device General

A device that will be recognized by your computer and install on its own.

driver General

A group of files that allows a device to communicate with the computer’s operating system.

Bluetooth General

A short-range wireless communication technology that uses radio waves to transmit information.

NFC (Near Field Communication) General

Enables short-range communication between compatible devices.

volatile storage General

Storage that is available only while the system is on and disappears when the system is turned off.

non-volatile storage General

Storage that is saved and available even when the system is shut down.

network-attached storage (NAS) General

Storage that contains one or more drives that can be accessed over a network.

file server General

Network attached storage that is equipped with powerful network adapters.

WLAN General

A wireless LAN that uses radio frequency technology to send and receive data.

VLAN General

A virtual LAN that allows for the setup of separate networks by configuring a network device.

wireless networking standards General

A set of protocols that specify how your Wi-Fi network and other data transmissions work.

command line interface (CLI) General

Processes commands to a computer program in the form of lines of text.

routing table General

A list of specific routing destinations; essentially a map for the router.

network device General

An electronic device which is required for communication between devices.

network adapter General

An internal component of a computer that is used for communicating over a network.

modem General

A network device that allows a device to connect to the Internet.

switch General

Enables wired connections between more than one computer or device.

access point General

A network device that allows other Wi-Fi devices to connect to a wired network.

Troubleshooting General

A systematic approach to solving a problem.

View Page Source General

Displays the HTML, CSS, and JavaScript code of a website.

Developer Tools General

Browser tools that help programmers diagnose problems, build and maintain secure websites.

Elements Panel General

Used for inspecting and making live-edits of the HTML and CSS.

Console Panel General

Used for entering live JavaScript for testing and debugging.

Application Panel General

Used for inspecting all resources that are loaded like databases, storage, cookies, images, etc.

Session Storage General

Temporary storage that is emptied when the browser is closed.

Local Storage General

Persistent storage; should be encrypted.

Cache General

Stores website data such as HTML and CSS to reduce load time.

Cookies General

Stores website preferences and personal data.

Security Panel JavaScript

Used for debugging issues and checking the website’s digital certificate.

Data General

A collection of numbers or data points.

Information General

Created when a collection of data is organized or structured.

Knowledge General

Pulls meaning from information by analyzing the organized data and generating insights.

Data In Use General

This is when data is being accessed by a person or program.

Data in Transit General

This is when data is actively moving from one location to another.

Data at Rest General

This is when data is stored in a specific place that isn’t actively moving to other devices or networks.

Database General

A collection of data that is organized in a structured way.

Table General

A category of information.

Record General

A single entry in a database table.

Field General

A specific category of data within a record.

Database Management System General

An electronic system that allows data to be easily accessed, updated, and manipulated.

Syntax General

The set of rules that define how commands and instructions are written.

Query General

A request for information from a database.

SQL injection (SQLi) General

Refers to an attack where a cybercriminal attempts to use an input field to write and run malicious SQL statements.

Cross Site Scripting (XSS) General

An attack in which malicious scripts are sent to users through a website.

Input Validation General

A programming technique used to validate the input from the user. The code will check the data that the user inputs and make sure it fits certain criteria. This ensures that only the correct type of value is used within the input field.

Buffer General

A section of memory set aside to be used for a specific reason.

Buffer Overflow General

Occurs when there is more data put into a buffer than it can handle.

Error Exceptions (or Handling) JavaScript

Used by programmers to avoid revealing valuable clues to potential attackers.

Integer Overflow General

An error that occurs when the result of an integer operation does not fit within the allocated memory space.

vulnerability General

a weakness which can be exploited by a malicious actor / attacker to perform unauthorized actions within a computer system.

Cyber Threat General

A cyber threat is the potential harm that could be caused by someone taking advantage of a vulnerability.

Cyber Attack General

Cyber attacks occur when threat actors exploit, or take advantage of, vulnerabilities to execute a malicious plan to harm a network, computer system, or organization

Nmap General

Nmap (Network Mapper) is a free and open source tool that scans systems over a network and provides a wealth of information about them, such as their open ports.

Risk Management General

Risk management is the process of identifying, evaluating, and addressing an organization's cybersecurity threats.

code General

A term used in programming for the set of instructions that can be run or executed by a computer.

interpreted language General

Translates and executes program code line by line into machine code.

compiled language General

Translates, or “compiles” the entire code into machine code and then runs the program, or sets aside to run later.

markup language General

Uses tags to format and define elements within a document. The tags are not shown when the document is displayed.

query language General

Used to make queries, or searches, in databases and information systems.

Assembly Language General

A programming language that is very close to machine code and used for a specific type of processor.

scripting language General

Uses a series of commands within a file that is capable of being executed without being compiled.

variable General

An identifier that stores data or information and can be changed at any time.

constant General

An identifier that stores data or information and cannot be changed.

integer General

A number can be positive, negative, or zero WITHOUT a decimal component. -50; 0; 5

float General

A number can be positive, negative, or zero WITH a decimal component. 3.2; 0.0; 4.5652

string General

Contains text or a sequence of letters, numbers, punctuation, spaces, etc. "Hello, world!"; "abc123"

char General

Contains a single character or punctuation. a; z; 1; !; #

Boolean General

Binary and evaluates to either true or false. true; false

Define a Function JavaScript

Defining a function means to teach the computer a new command and explain what it should do when receiving that command.

Define a Function

Call a Function JavaScript

Calling a function actually gives the command, so the computer will run the code for that function.

Call a Function

Pseudocode General

A set of steps that uses the structural conventions of programming but is intended for human reading.

Comments General

Phrases entered into code to provide information or direction.

Flow Chart General

A diagram made up of shapes and arrows used to display the order of steps in a program or process.

Condition General

A condition is code that you put inside an if statement or while-loop.

Condition

If Statement General

An if statement lets you ask a question to the program and only run code if the answer is true.

If Statement

If Else Statement General

Control structure that lets us run either one section of code or another depending on a test.

If Else Statement

Control Structure General

A control structure lets us change the flow of the code.

Control Structure loops if statements

Selection General

Using a condition to determine which part of an algorithm is executed.

Loop General

A loop is a way to repeat code in your program.

Loop

For Loop JavaScript

A for loop lets us repeat code a **fixed number of times**.

For Loop

While Loop General

Lets us repeat code as long as something is true.

While Loop

array General

A fixed container that stores an ordered collection of items.

vector General

A resizable container that stores an ordered collection of items.

object General

Can store combinations of keys and values where the value can be accessed by its associated key.

properties of an object General

The variables that are attached to the object.

attributes of an object General

An object’s characteristics.

methods of an object General

Defines what an object can do.

ORDER BY General

A SQL clause that sorts the returned query results by one or more columns

ASC General

Ascending order; the default sort direction

DESC General

Descending order; used to reverse the default sorting

JOIN General

A SQL operation that combines rows from two or more tables based on a related column.

Cross Join General

A join where each row in one table is paired with every row in another.

Foreign Key General

A field in one table that refers to the primary key in another table.

Alias General

A temporary name assigned to a column or table using the `AS` keyword in SQL

AS General

A SQL keyword used to rename fields or tables in the query result

Resume General

A document that summarizes a person’s education, work experience, skills, and accomplishments

Soft Skills General

Personal attributes such as teamwork, communication, and time management

Hard Skills General

Technical or learned abilities like programming, software use, or typing speed