Main content
Course: NOVA Labs > Unit 1
Lesson 2: CybersecurityCybersecurity glossary
Here's a glossary of common cybersecurity terms.
Antivirus software
Computer programs that can block, detect, and remove viruses and other malware.
Computer programs that can block, detect, and remove viruses and other malware.
Backups/backing up files
Extra copies of computer files that can be used to restore files that are lost or damaged.
Extra copies of computer files that can be used to restore files that are lost or damaged.
Bandwidth
The amount of data that can pass through a network or part of a network per second.
The amount of data that can pass through a network or part of a network per second.
Botnet
Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn’t be achieved with a single computer.
Multiple computers on a network that are infected with a program that can be controlled remotely. The infected computers are usually used to cause damage that couldn’t be achieved with a single computer.
Computer network
Two or more interconnected devices that can exchange data.
Two or more interconnected devices that can exchange data.
Computer virus
A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
A computer program that can copy itself and cause harm in various ways, such as stealing private information or destroying data.
DDoS
A distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.
A distributed denial of service attack attempts to make an online service, like a website, unavailable by overwhelming it with a flood of traffic from a team of computers.
Doxnet
A fictional virus modeled after the Stuxnet virus. Like Stuxnet, Doxnet is able to damage physical infrastructure.
A fictional virus modeled after the Stuxnet virus. Like Stuxnet, Doxnet is able to damage physical infrastructure.
Encryption
The process of using codes to make readable information unreadable. Encrypted information cannot be read until it is decrypted using a secret key.
The process of using codes to make readable information unreadable. Encrypted information cannot be read until it is decrypted using a secret key.
Firewall
Software designed to block malware from entering protected networks.
Software designed to block malware from entering protected networks.
Hacktivist
Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
Someone who uses computers and computer networks to disrupt services or share secret information in an effort to draw attention to political or social issues.
Internet service provider (ISP)
A company or organization that gives users and devices access to the Internet.
A company or organization that gives users and devices access to the Internet.
Keylogger malware
A program that records every key struck on a keyboard and sends that information to an attacker.
A program that records every key struck on a keyboard and sends that information to an attacker.
Malware
Software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other computer programs.
Software that harms computers, networks, or people. Includes viruses, worms, ransomware, and other computer programs.
Phishing
Attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
Attempting to trick people into revealing sensitive information, such as passwords and credit card numbers, often by using emails or fake websites that look like they are from trusted organizations.
Ransomware
A type of malware that holds victims’ computer files hostage by locking access to them or encrypting them. It then demands a ransom if the victim wants his or her files back.
A type of malware that holds victims’ computer files hostage by locking access to them or encrypting them. It then demands a ransom if the victim wants his or her files back.
Server
A computer or computer program that provides specific services on a network, such as an email server that directs emails and a web server that serves up web pages.
A computer or computer program that provides specific services on a network, such as an email server that directs emails and a web server that serves up web pages.
Software
Consists of code written in a programming language that instructs computers to perform specific tasks.
Consists of code written in a programming language that instructs computers to perform specific tasks.
Software patch
A piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.
A piece of software designed to update a computer program in order to fix a software vulnerability or improve the program.
Software vulnerability
A flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.
A flaw or weakness in a computer program that hackers or malware can exploit to gain access to a system or damage it.
Spam
Unsolicited emails sent to many addresses. The purpose of most spam is to make money through advertising or identity theft.
Unsolicited emails sent to many addresses. The purpose of most spam is to make money through advertising or identity theft.
USB drive
A data storage device that is used to store, back up, and transfer computer files.
A data storage device that is used to store, back up, and transfer computer files.
USB port
A type of connection between devices that can exchange information and power supply.
A type of connection between devices that can exchange information and power supply.
Want to join the conversation?
- What exactly is the Stuxnet virus? Is it a program, a website or neither? The article mentions that it is capable of damaging infrastructure, but how would it do that?(46 votes)
- Its a Computer Worm designed to attack PLCs (Programmable Logic Controllers) which are used to control machinery, such as centrifuges in nuclear reactors. In Iran's case it collected information on Iran's nuclear infrastructure and caused the nuclear centrifuges to rapidly tear themselves apart, thus hindering its nuclear program.
How Does It Work?
Quick Summary:
1.) Delivered via an infected USB drive
2.) Worm propagates across the network scanning for computers with PLC software (in this case Siemens Step7)
3.) If the conditions are met it introduces a rootkit component onto the software giving unexpected commands to it while returning normal values to the user.
----If the conditions are not met lie dormant.
Additional Reading Material:
http://spectrum.ieee.org/telecom/security/the-real-story-of-stuxnet
http://www.quora.com/Why-is-Stuxnet-termed-as-the-most-dangerous-malware-in-history
https://en.wikipedia.org/wiki/Stuxnet
Hope this helps!!(57 votes)
- I think we should look to artificial intelligence to act as anti hacker cops.(18 votes)
- Two things wrong here. One for policing automation should NEVER be used. that removes the human element necessary to help (even if only a little) take power away form authority. Second off ai already exist. We can mimic learning. Google uses this all the time(i think some advert companies do now). The reason people think it's not here yet is because in honesty a computer is still VERY slow compared to a human brain. we have the software what we lack is the hardware. Not even quantum chips will (yet) fully fulfill this role. And yes those chips already exist and in the midst of being standardized into production. Well sort of. There's a hybrid from what i've heard. A true one is being crafted out of manufactured PURE diamond. Of which yes we can create diamonds now.lol Science fiction is often science fact.(3 votes)
- What is a Trojan horse in cyber security terms?(4 votes)
- Trojans refer to any malware that requires the user to install and/or replicate. This is usually done by some form of social engineering to trick the user that the software is safe or perhaps something else entirely.
For example if you go to a website that gives you a pop up saying you need to update flash player. If you click on that, you may think you just installed/updated flash but instead you just installed a trojan malware (just like the Greeks tricked the Trojans into taking the wooden horse into the city walls).
This is why it is alway recommended you go directly to the software developer for updates. Flash Player for instance (https://get.adobe.com/flashplayer/) is the only place you should be downloading this software.(11 votes)
- Criminal hacking is obviously illegal.
What about a hacktivist? Is that different?(7 votes)- In most cases, a hackivist still breaks the law even though their cause may be moral or justified.
Also, it can sometimes be a very subjective case whether it is moral or justified.. It is similar to vigilantism, which is also illegal.(7 votes)
- When will people gain their security and privacy?(2 votes)
- When people find a stronger form of encryption that takes too long to preform in a reasonable time even with the evolution of computers.The strength of encryption will have to be increased over the years.(4 votes)
- If what happened to Tim happened to me what do I do?(2 votes)
- Keep your personal information secure so nobody will see it, for example, your house address, when you take a picture of something and your house address gets caught in the picture, cut the address of your house off so a crime ring won't steal your information.(5 votes)
- what will happen if i posted a picture of myself online(0 votes)
- Probably nothing, the picture could give your location and information about you that you may not want to be shared though. Just be careful of the pictures you post, once it's up, there's no taking it down.(8 votes)
- Since the internet will never be 100% safe, what kind of Software Patches would be most effective?(0 votes)
- Patch everything & then patch again. New bugs & vulnerabilities are found every day. Developers try and flag things as critical security but operating systems and networks are very dynamic.
If you are using Windows I recommend turning on Windows update to automatically install. Also use something like PSI (http://secunia.com/vulnerability_scanning/personal/) to monitor 3rd party software. Not perfect but will catch most critical patches.(4 votes)
- In the section about antivirus software, how do those computer programs detect and remove malware? Does it get reported to the police or anything?(3 votes)
- Can people use more than one virus at a time to hack a computer(2 votes)