Cybersecurity terminology

Assignment Help Basic Computer Science
Reference no: EM132803562

Cybersecurity Terminology C-D

Here are some Key Terms. Please give an examples of each.

Key Terms

Cache - Storing the response to a particular operation in temporary high-speed storage is to serve other incoming requests better. eg. you can store a database request in a cache till it is updated to reduce calling the database again for the same query.

Cipher - Cryptographic algorithm for encrypting and decrypting data.

Code Injection - Injecting malicious code into a system by exploiting a bug or vulnerability.

Cross-Site Scripting - Executing a script on the client-side through a legitimate website. This can be prevented if the website sanitizes user input.

Compliance - A set of rules defined by the government or other authorities on how to protect your customer's data. Common ones include HIPAA, PCI-DSS, and FISMA.

Dictionary Attack - Attacking a system with a pre-defined list of usernames and passwords. eg. admin/admin is a common username/password combination used by amateur sysadmins.

Dumpster Diving - Looking into a company's trash cans for useful information.

Denial of Service & Distributed Denial of Service - Exhausting a server's resources by sending too many requests is Denial of Service. If a botnet is used to do the same, its called Distributed Denial of Service.

DevSecOps - Combination of development and operations by considering security as a key ingredient from the initial system design.

Directory Traversal - Vulnerability that lets attackers list al the files and folders within a server. This can include system configuration and password files.

Domain Name System (DNS) - Helps convert domain names into server IP addresses. eg. Google.com -> 216.58.200.142

DNS Spoofing - Trikcnig a system's DNS to point to a malicious server. eg. when you enter ‘facebook.com', you might be redirected to the attacker's website that looks like Facebook.

Reference no: EM132803562

Questions Cloud

Discuss financial benefits of chatbots : Examine Alexa's skill in ordering drinks from Starbucks. Discuss financial benefits of chatbots. Discuss potential impact of autonomous vehicles on our lives.
Improving the privacy of e-mail in organization : Write a paper that outlines five recommendations for improving the privacy of e-mail in an organization.
Different types of key-operated lock mechanisms : What are the different types of key-operated lock mechanisms and how does each of their interior mechanisms work?
Potential risks involved with cloud computing : What are some of potential risks involved with cloud computing? Does research and model in article propose viable solution to cloud-based risk management
Cybersecurity terminology : Cache - Storing the response to a particular operation in temporary high-speed storage is to serve other incoming requests better.
Discuss benefits of virtualization software : Discuss the benefits of virtualization software, as described in the text.
Describe security infrastructure needed to establish trust : Describe the security infrastructure needed to establish "trust" when a device connects to the network.
Empowering organization to achieve its ultimate vision : Risk management is one of the most important components in empowering an organization to achieve its ultimate vision.
IT Strategic Decision For Circuit City : What Are The Roadblocks? How Can You Overcome The Roadblocks? What Are The Main Steps To Implement Your Plan?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How much to adjust the federal funds rate

Professor Jay Diego, stresses that the Fed is "data dependent" when deciding when and by how much to adjust the federal funds rate.

  Display an understanding of span of control and organization

What do you think are the pros and cons of changing the CEO's span of control in this manner? Will this increase or decrease the complexity of the organization? Your answer should display an understanding of span of control and organizational comp..

  Educational information is safeguarded

From the e-Activity, discuss how students' educational information is safeguarded. Decide if you believe that the safeguard methods are sufficient, too stringent, or too lenient and support your answer.

  Do you think that the media lab can make a positive impact

In what research and other activities would you try to participate to help bring the benefits of information and communications technology to India? Do you think that the Media Lab can make a positive impact? Why or why not?

  Predictive analytics and performance improvement

How does technology and health IT contribute to data monitoring, predictive analytics, and performance improvement

  Database platforms-graph databases

We have been assigned one of the class of database platforms i.e. Graph Databases. There is a need to prepare both presentation and research for the same.

  Synchronous or asynchronous

Explain which type of bus (synchronous or asynchronous) would be most appropriate for handling communications between the CPU and:

  E-commerce a technique of modern business

E-business or E-commerce is a technique of modern business, which means electronic commerce that helps any organization buying and selling products online. In other word, we can say that it helps the organization in various ways, such as-:

  Ensure the reliability of code

What steps should we take to ensure the reliability of our code? What tools do you Integrated Development Environments.

  Macroeconomic variables decline and grow

If the economy goes into a recession which macroeconomic variables decline and which grow? Why do they do that?

  Outlier payment calculation to determine

The Safe-Cross® guidewire is present on the following claim. Complete an outlier payment calculation to determine whether this claim would qualify for a high cost outlier payment.

  How many times does this loop execute

Is the output different if you change the order of the statements in the body of the loop, so that loopNum++ comes after the output statement?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd