Terms and definitions from Course 5


Security through obscurity



Yüklə 126,95 Kb.
səhifə13/16
tarix19.12.2023
ölçüsü126,95 Kb.
#186217
1   ...   8   9   10   11   12   13   14   15   16
zbJSBltbTgSqZI2cm2kgiw 8ceea7217478477aa50f1e277b9abef1 C5-Glossary

Security through obscurity: The principle that if no one knows what algorithm is being used or general security practices, then one is safe from attackers
Seed value: A secret value that is used to initialize a process that is generated by software using one or more values
Self-signed certificate: This certificate has been signed by the same entity that issued the certificate
Serial number: A unique identifier for their certificate assigned by the CA which allows the CA to manage and identify individual certificates
Session hijacking (cookie hijacking): A common meddler in the middle attack
Session key: The shared symmetric encryption key using TLS sessions to encrypt data being sent back and forth
Severity: Includes factors like what and how many systems were compromised and how the breach affects business functions
SHA1: It is part of the secure hash algorithm suite of functions, designed by the NSA and published in 1995

Shannon's maxim: It states that the system should remain secure, even if your adversary knows exactly what kind of encryption systems you're employing, as long as your keys remain secure
Single Sign-on (SSO): An authentication concept that allows users to authenticate once to be granted access to a lot of different services and applications
Social engineering: An attack method that relies heavily on interactions with humans instead of computers
Software signing certificate: Trust mechanism where a software vendor can cryptographically sign binaries they distribute using a private key
Spear phishing: Phishing that targets individual or group - the fake emails may contain some personal information like your name, or the names of friends or family
Spoofing: When a source is masquerading around as something else
Spyware: The type of malware that's meant to spy on you
SQL Injection Attack: An attack that targets the entire website if the website is using a SQL database

Yüklə 126,95 Kb.

Dostları ilə paylaş:
1   ...   8   9   10   11   12   13   14   15   16




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin