Table of Contents
CEH Certified Ethical Hacker Cert Guide Index
Return to CEH Certified Ethical Hacker Cert Guide, Security, DevOps Security - Security SRE - CI/CD Security, Cloud Native Security - Microservices Security - Serverless Security, DevSecOps, Parallel Programming and Security, Concurrency and Security, Database Security, Data Science Security, Machine Learning Security, Cybersecurity Bibliography, Cybersecurity Courses, Cybersecurity Glossary, Awesome Cybersecurity, Cybersecurity GitHub, Cybersecurity Topics
Fair Use Source: B09M86B259 (CEHsntos 2022)
This glossary contains the key terms from the book. Terms from each chapter’s “Define Key Terms” task are defined here, along with other terms you might recognize.
802.11i standard - “An amendment to the 802.11 standard. The 802.11i standard uses Wi-Fi Protected Access (WPA2) and Advanced Encryption Standard (AES) as a replacement for RC4 encryption.” (CEHsntos 2022)
A
- acceptable use policy (AUP) - “A policy that defines what employees, contractors, and third parties can and cannot do with the organization’s IT infrastructure and its assets. AUPs are common for access to IT resources, systems, applications, Internet access, email access, and so on.” (CEHsntos 2022)
- access point spoofing - “The act of pretending to be a legitimate access point with the purpose of tricking individuals into passing traffic via the fake connection so that it can be captured and analyzed.” (CEHsntos 2022)
- active fingerprinting An active method of identifying the operating system (OS) of a targeted computer or device that involves injecting traffic into the network.” (CEHsntos 2022)
- ad hoc mode A form of wireless networking in which wireless stations communicate with each other directly, without an access point. Ad hoc operation is ideal for small networks of no more than two to four computers. See also infrastructure mode.” (CEHsntos 2022)
- Address Resolution Protocol (ARP) A protocol used to map a known Internet Protocol (IP) address to an unknown physical address on the local network. For example, IPv4 uses 32-bit addresses, whereas Ethernet uses 48-bit Media Access Control (MAC) addresses. The ARP process can take the known IP address that is being passed down the stack and use it to resolve the unknown MAC address by means of a broadcast message. This information is helpful in an ARP cache.“ (CEHsntos 2022)
- algorithm A mathematical procedure used for solving a problem. Used for the encryption and decryption of information and data.“ (CEHsntos 2022)
- annual rate of occurrence (ARO) The expected rate of occurrence over the period of one year.” (CEHsntos 2022)
- anomaly detection A type of intrusion detection that looks at behaviors that are not normal or within standard activity. These unusual patterns are identified as suspicious. Anomaly detection has the capability of detecting all kinds of attacks, including ones that are unknown. Its vulnerability is that it can produce a high rate of false positives.” (CEHsntos 2022)
- assessment An evaluation/valuation of IT assets based on predefined measurement]] or evaluation criteria. This usually requires an accounting or auditing firm to conduct an assessment, such as a risk or vulnerability assessment.” (CEHsntos 2022)
- asymmetric algorithm A mathematical procedure that uses a pair of different but related cryptographic keys to encrypt and decrypt data.” (CEHsntos 2022)
- audit A professional examination and verification performed by either an independent party or internal team to examine a company’s accounting documents and supporting data. Audits conform to a specific and formal methodology and specify how an investigation is to be conducted with specific reporting elements and metrics being examined (such as an IT audit according to Generally Accepted Auditing Standards).“ (CEHsntos 2022)
- authentication A method that enables identification of an authorized person. Authentication verifies the identity and legitimacy of the individual to access the system and its resources. Common authentication methods include passwords, tokens, and biometric systems.” (CEHsntos 2022)
- authorization The process of granting or denying access to a network resource based on the user’s credentials.“ (CEHsntos 2022)
- availability A state that ensures the systems responsible for delivering, storing, and processing data are available and accessible as needed by individuals who are authorized to use the resources. One of the three elements of the CIA security triad, along with confidentiality and integrity.” (CEHsntos 2022)
B
- block cipher An encryption scheme in which the data is divided into fixed-size blocks (each of which is encrypted independently of the others).“ (CEHsntos 2022)
- Blowfish A symmetric-key block cipher designed as a replacement for DES or IDEA. Since its release in 1993, it has been gaining acceptance as a fast, strong encryption standard. It takes a variable-length key that can range from 32 to 448 bits.” (CEHsntos 2022)
- bluejacking The act of sending unsolicited messages, pictures, or information to a Bluetooth user.“ (CEHsntos 2022)
- bluesnarfing The theft of information from a wireless device through Bluetooth connection.” (CEHsntos 2022)
- buffer overflow In computer programming, a condition that occurs when a software application somehow writes data beyond the allocated end of a buffer in memory. Buffer overflows are usually caused by software bugs, lack of input validation, and improper syntax and programming, and they expose the application to malicious code injections or other targeted attack commands.” (CEHsntos 2022)
- business continuity planning (BCP) A system or methodology to create a plan for how an organization will resume partially or completely interrupted critical functions within a predetermined time after a disaster or disruption occurs. The goal is to keep critical business functions operational.“ (CEHsntos 2022)
- business impact analysis (BIA) A component of the business continuity plan that looks at all the operations that an organization relies on for continued functionality. It seeks to distinguish which operations are more crucial than others and require a greater allocation of funds in the wake of a disaster.” (CEHsntos 2022)
C
- catastrophe A calamity or misfortune that causes the destruction of facilities and data.“ (CEHsntos 2022)
- certificate authority (CA) An entity used by public key infrastructure (PKI) to issue public key certificates. The public key certificate verifies that the public key contained in the certificate actually belongs to the person or entity noted in the certificate. The CA’s job is to verify and validate the owner’s identity.” (CEHsntos 2022)
- cipher text The unreadable form of plaintext or clear text after it has been encrypted.“ (CEHsntos 2022)
- closed-circuit television (CCTV) A system composed of video transmitters that can feed the captured video to one or more receivers. Typically used in banks, casinos, shopping centers, airports, or anywhere that physical security can be enhanced by monitoring events. Placement in these facilities is typically at locations where people enter or leave the facility or at locations where critical transactions occur.“ (CEHsntos 2022)
- combination lock A lock that can be opened by turning dials in a predetermined sequence.“ (CEHsntos 2022)
- Common Vulnerabilities and Exposures (CVE) CERT-sponsored list of vulnerabilities and exposures.” (CEHsntos 2022)
- Common Vulnerability Scoring System (CVSS) An industry standard that was created by security practitioners in the Forum of Incident Response and Security Teams (FIRST) to provide the principal characteristics of a vulnerability and produce a numerical score reflecting its severity.“ (CEHsntos 2022)
- Common Weakness Enumeration (CWE) A universal online dictionary of software weaknesses maintained by the MITRE Corporation.” (CEHsntos 2022)
- Computer Emergency Response Team (CERT) An organization developed to provide incident response services to victims of attacks, publish alerts concerning vulnerabilities and threats, and offer other information to help improve an organization’s capability to respond to computer and network security issues.“ (CEHsntos 2022)
- confidentiality A condition in which data or information is not made available or disclosed to unauthorized persons. One of the three elements of the CIA security triad, along with integrity and availability.” (CEHsntos 2022)
- confidentiality agreement An agreement that employees, contractors, or third-party users must read and sign before being granted access rights and privileges to the organization’s IT infrastructure and its assets.“ (CEHsntos 2022)
- cookie A message or small amount of text that a website stores in a text file on the computer running the web browser used to visit the website. The message is sent back to the web server each time the browser goes to that website and is useful in maintaining state in what is otherwise a stateless connection.“ (CEHsntos 2022)
- crossover error rate (CER) A comparison measurement]] for different biometric devices and technologies to measure their accuracy. The CER is the point at which false acceptance rate (FAR) and false rejection rate (FRR) are equal, or cross over. The lower the CER, the more accurate the biometric system.“ (CEHsntos 2022)
- cross-site request forgery (CSRF or XSRF) An attack that occurs when unauthorized commands are transmitted from a user who is trusted by the application. CSRF is different from XSS because it exploits the trust that an application has in a user’s browser.” (CEHsntos 2022)
- cryptographic key The piece of information that controls the cryptographic algorithm. The key specifies how the clear text is turned into cipher text or vice versa. For example, a DES key is a 64-bit parameter consisting of 56 independent bits and 8 bits that are used for parity.“ (CEHsntos 2022)
D
- Data Encryption Standard (DES) A symmetric encryption standard (FIPS 46-3) that is based on a 64-bit block. DES uses the data encryption algorithm to process 64 bits of plaintext at a time to output 64-bit blocks of cipher text. Even though the DES key is 64 bits in length, it has a 56-bit work factor and has four modes of operation.” (CEHsntos 2022)
- denial of service (DoS) The process of having network resources, services, and bandwidth reduced or eliminated because of unwanted or malicious traffic. The goal of a DoS attack is to render the network or system nonfunctional. Some examples include Ping of Death, SYN flood, IP spoofing, and Smurf attacks.“ (CEHsntos 2022)
- destruction The act of destroying data and information or permanently depriving information from the legitimate user.” (CEHsntos 2022)
- dictionary attack An attack in which a text file full of dictionary words is loaded into a password program and then run against user accounts located by the application. If simple passwords have been used, this attack might be enough to crack the code. It can be performed offline with tools like LCP and Hashcat, and it can be performed online with tools like Brutus and THC-Hydra.” (CEHsntos 2022)
- digital certificate An electronic document that is usually issued by a trusted third party, such as a certificate authority, and contains the name of a user or server, a digital signature, a public key, and other elements used in authentication and encryption. X.509 is the most common type of digital certificate.“ (CEHsntos 2022)
- digital signature An electronic signature that can be used to authenticate the identity of the sender of a message. It is created by encrypting a hash of a message or document with a private key. The message to be sent is passed through a hashing algorithm; the resulting message digest or hash value is then encrypted using the sender’s private key.” (CEHsntos 2022)
- digital watermark A technique that adds hidden copyright information to a document, picture, or sound file. It can be used to enable an individual working with electronic data to add hidden copyright notices or other verification messages to digital audio, video, or image signals and documents.“ (CEHsntos 2022)
discretionary access control (DAC) An access policy that enables the resource owner to determine who is permitted access. “ (CEHsntos 2022)
distributed denial of service (DDoS) A type of attack similar to denial of service (DoS), except that the attack is launched from multiple, distributed agent IP devices.” (CEHsntos 2022)
- Domain Name Service (DNS) A hierarchy of Internet servers that translates alphanumeric domain names into IP addresses and vice versa. Because domain names are alphanumeric, they are easier for humans to remember than IP addresses.“ (CEHsntos 2022)
- due diligence The execution of due care over time. When you see the term due diligence, think of the first letter of each word and remember “do detect,” because due diligence is about finding the threats an organization faces. This is accomplished by using standards, best practices, and checklists.” (CEHsntos 2022)
E
- end-user licensing agreement (EULA) The software license that software vendors create to protect and limit their liability and to hold the purchaser liable for illegal pirating of the software application. The EULA usually contains language that protects the software manufacturer from software bugs and flaws and limits the liability of the vendor.” (CEHsntos 2022)
- enterprise vulnerability management The overall responsibility and management of vulnerabilities within an organization and how that management of vulnerabilities will be achieved through dissemination of duties throughout the IT organization.“ (CEHsntos 2022)
- ethical hack A type of hack that is done to help a company or individual identify potential threats on the organization’s IT infrastructure or network.” (CEHsntos 2022)
- ethical hacker A security professional who legally attempts to break in to a computer system or network to find its vulnerabilities. An ethical hacker must obey rules of engagement, do no harm, and stay within legal boundaries.“ (CEHsntos 2022)
- exploit An attack on a computer system, especially one that takes advantage of a particular vulnerability that the system offers to intruders.” (CEHsntos 2022)
- exposure factor (EF) A value calculated by determining the percentage of loss to a specific asset if a specific threat is realized. For example, if a fire were to hit a Houston data center that has an asset value of $250,000, it is believed that there would be a 50 percent loss or exposure factor. Adding additional fire controls could reduce this figure.“ (CEHsntos 2022)
- Extensible Authentication Protocol (EAP) A method of authentication that can support multiple authentication methods, such as tokens, smart cards, certificates, and one-time passwords.” (CEHsntos 2022)
F
- false acceptance rate (FAR) A measurement]] that evaluates the likelihood that a biometric access control system will wrongly accept an unauthorized user.“ (CEHsntos 2022)
- firewall Security system in hardware or software form that is used to manage and control both network connectivity and network services. Firewalls act as chokepoints for traffic entering and leaving the network, and prevent unrestricted access. Firewalls can be stateful or stateless.” (CEHsntos 2022)
G
- gap analysis The analysis of the differences between two different states, often for the purpose of determining how to get from point A to point B; therefore, the aim is to look at ways to bridge the gap. Used when performing audits and risk assessments.” (CEHsntos 2022)
- guidelines Recommended actions and operational guides for users. Much like standards but less stringent.“ (CEHsntos 2022)
H
- hashing algorithm A mathematical algorithm used to verify the integrity of data and messages. A well-designed hashing algorithm examines every bit of the data while it is being condensed, and even a slight change to the data will result in a large change in the message hash. It is considered a one-way process.“ (CEHsntos 2022)
I
identify theft An attack in which an individual’s personal, confidential, banking, and financial identity is stolen and compromised by another individual or individuals. Use of your Social Security number without your consent or permission might result in identify theft.” (CEHsntos 2022)
- inference attack An attack that relies on the attacker’s ability to make logical connections between seemingly unrelated pieces of information.“ (CEHsntos 2022)
- infrastructure mode A form of wireless networking in which wireless stations communicate with each other by first going through an access point. See also ad hoc mode.“ (CEHsntos 2022)
- Internet Assigned Numbers Authority (IANA) A primary governing body for Internet networking. IANA oversees three key aspects of the Internet: top-level domains (TLDs), IP address allocation, and port number assignments. IANA is tasked with preserving the central coordinating functions of the Internet for the public good. IANA is used by hackers and security specialists to track down domain owners and their contact details.” (CEHsntos 2022)
- intrusion detection system (IDS) A network or host-based monitoring device installed and used to inspect inbound and outbound traffic and activity and identify suspicious patterns that might indicate a network or system attack by someone attempting to break into or compromise a system.“ (CEHsntos 2022)
- inverse SYN cookie A method for tracking the state of a connection, which takes the source address and port, along with the destination address and port, and then through an SHA-1 hashing algorithm. This value becomes the initial sequence number (ISN) for the outgoing packet. Used in dealing with SYN flood attacks.” (CEHsntos 2022)
- IT Short for information technology; the use of computers, software, Internet/intranet, and telecommunications.“ (CEHsntos 2022)
- IT infrastructure A general term to encompass all information technology assets (hardware, software, data), components, systems, applications, and resources.“ (CEHsntos 2022)
- IT security architecture and framework A document that defines the policies, standards, procedures, and guidelines for information security.” (CEHsntos 2022)
J
K
- KARMA Short for Karma Attacks Radio Machines Automatically. A man-in-the-middle]] attack that creates a rogue AP and enables an attacker to intercept wireless traffic. A radio machine could be a mobile device, a laptop, or any Wi-Fi–enabled device. In a KARMA attack scenario, the attacker listens for the probe requests from wireless devices and intercepts them to generate the same SSID for which the device is sending probes.“ (CEHsntos 2022)
- keylogger (keystroke logger) A tool that an attacker uses to capture user keystrokes in a system to steal sensitive data (including credentials). There are two main types of keyloggers: keylogging hardware devices and keylogging software. A hardware (physical) keylogger is usually a small device that can be placed between a user’s keyboard and the main system. Software keyloggers are dedicated programs designed to track and log user keystrokes.“ (CEHsntos 2022)
L
M
- mandatory access control (MAC) A means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (such as clearance) of subjects to access information of such sensitivity.“ (CEHsntos 2022)
- methodology A set of documented procedures used for performing activities in a consistent, accountable, and repeatable manner.” (CEHsntos 2022)
- Moore's Law The prediction that processing power of computers will double about every 18 months.“ (CEHsntos 2022)
N
- Network Address Translation (NAT) A method of connecting multiple computers to the Internet using one IP address so that many private addresses are converted to a single public address.“ (CEHsntos 2022)
- NIST 800-42 A document that provides guidance on network security testing. It deals mainly with techniques and tools used to secure systems connected to the Internet. This document was superseded in 2008 by NIST SP 800-115, “Technical Guide to Information Security Testing and Assessment.”“ (CEHsntos 2022)
- nonrepudiation A system or method put in place to ensure that an individual cannot deny his own actions.“ (CEHsntos 2022)
O
- OS (operating system) identification The practice of identifying the operating system of a networked device through either passive or active techniques.“ (CEHsntos 2022)
P
- packers Similar to programs such as WinZip, Rar, and Tar in that they compress files. However, whereas compression programs compress files to save space, packers do this to obfuscate the activity of the malware. The idea is to prevent anyone from viewing the malware’s code until it is placed in memory. Packers serve a second valuable goal to the attacker in that they work to bypass network security protection mechanisms.” (CEHsntos 2022)
- Password Authentication Protocol (PAP) A form of authentication in which clear-text usernames and passwords are passed.” (CEHsntos 2022)
- penetration test A method of evaluating the security of a network or computer system by simulating an attack by a malicious hacker without doing harm and with the owner’s written consent.” (CEHsntos 2022)
- phishing The act of misleading or conning an individual into releasing and providing personal and confidential information to an attacker masquerading as a legitimate individual or business. This is usually done by sending many emails that request the victim to follow a link to a bogus website. Closely associated with spear phishing, which is more targeted, and whaling, which targets CEOs or other high-ranking employees.” (CEHsntos 2022)
- ports A communications endpoint used by protocols and applications for communication. Port numbers are divided into three ranges: well-known ports, registered ports, and dynamic/private ports. Well-known ports are those from 0 to 1023, registered ports are those from 1024 to 49151, and dynamic/private ports are those from 49152 to 65535.“ (CEHsntos 2022)
- promiscuous mode Mode in which a network adapter examines all traffic, unlike normal mode, in which it examines only traffic that matches its address. Promiscuous mode enables a single device to intercept and read all packets that arrive at the interface in their entirety; these packets may or may not have been destined for this particular target.“ (CEHsntos 2022)
- public key infrastructure (PKI) Infrastructure used to facilitate e-commerce and build trust. PKI is composed of hardware, software, people, policies, and procedures; it is used to create, manage, store, distribute, and revoke public key certificates. PKI is based on public key cryptography.“ (CEHsntos 2022)
Q
- qualitative analysis An evaluation and analysis based on a weighting or criticality factor valuation as part of the evaluation or analysis.” (CEHsntos 2022)
- qualitative assessment An analysis of risk that places the probability results into terms such as none, low, medium, and high.“ (CEHsntos 2022)
- quantitative analysis A numeric evaluation and analysis based on monetary or dollar valuation as part of the evaluation or analysis.” (CEHsntos 2022)
R
- red team A group of ethical hackers who help organizations explore network and system vulnerabilities by means of penetration testing.” (CEHsntos 2022)
- Rijndael A symmetric encryption algorithm chosen to be the Advanced Encryption Standard (AES).” (CEHsntos 2022)
- risk assessment A process for evaluating the exposure or potential loss or damage to the IT and data assets for an organization.“ (CEHsntos 2022)
- risk management The overall responsibility and management of risk within an organization. Risk management is the responsibility and dissemination of roles, responsibilities, and accountabilities for risk in an organization.“ (CEHsntos 2022)
- risk transference The shifting of responsibility or burden to another party or individual.” (CEHsntos 2022)
- rogue access point An 802.11 access point that has been set up by an attacker for the purpose of diverting traffic of legitimate users so that it can be sniffed or manipulated.“ (CEHsntos 2022)
- role-based access control (RBAC) A type of discretionary access control in which users are placed into groups to facilitate management. This type of access control is widely used by Microsoft Active Directory, Oracle Database, and SAP ECC.” (CEHsntos 2022)
S
- security countermeasure A security hardware or software technology solution that is deployed to ensure the confidentiality, integrity, and availability of IT assets that need protection.” (CEHsntos 2022)
- security defect Usually an unidentified and undocumented deficiency in a product or piece of software that ultimately results in a security vulnerability being identified.“ (CEHsntos 2022)
- security incident response team (SIRT) A team of professionals who usually encompass Human Resources, Legal, IT, and IT Security to appropriately respond to critical, major, and minor security breaches and security incidents that the organization encounters.” (CEHsntos 2022)
- security information and event management (SIEM) A combination of two previous technologies: security information management and security event management. This technology is used to provide real-time analysis of security logs generated in real time and includes a centralized location to store and process logs.“ (CEHsntos 2022)
- security workflow definition A flowchart that defines the communications, checks and balances, and domain of responsibility and accountability for the organization’s IT and IT security staff in the context of a defense-in-depth, layered approach to information security roles, tasks, responsibilities, and accountabilities.“ (CEHsntos 2022)
- separation of duties A definition of the roles, tasks, responsibilities, and accountabilities for information security uniquely for the different duties of the IT staff and IT security staff.” (CEHsntos 2022)
- service-oriented architecture A methodology used to build an architecture that is based on the use of services.” (CEHsntos 2022)
- session hijack A type of attack where the attacker gains unauthorized access to an application or a system by stealing a session cookie.” (CEHsntos 2022)
- Simple Network Management Protocol (SNMP) An application layer protocol that facilitates the exchange of management information between network devices. The first version of SNMP, v1, uses well-known community strings of public and private. Version 3 offers encryption.” (CEHsntos 2022)
- smurf attack A distributed denial-of-service (DDoS) attack in which an attacker transmits large amounts of Internet Control Message Protocol (ICMP) echo request (ping) packets to a targeted IP destination device using the targeted destination’s IP source address. This is called spoofing the IP source address. IP routers and other IP devices that respond to broadcasts will respond to the targeted IP device with ICMP echo replies, which multiplies the amount of bogus traffic.“ (CEHsntos 2022)
- social engineering The practice of tricking people into revealing sensitive data about their computer system or infrastructure. This type of attack targets people and is the art of human manipulation. Even when systems are physically well protected, social engineering attacks are possible.” (CEHsntos 2022)
- software vulnerability standard A standard that accompanies an organization’s vulnerability assessment and management policy. This standard typically defines the organization’s vulnerability window and how the organization is to provide software vulnerability management and software patch management throughout the enterprise.“ (CEHsntos 2022)
- spamming The use of any electronic communications medium to send unsolicited messages in bulk. Spamming is a major irritation of the Internet era.” (CEHsntos 2022)
- stateful inspection An advanced firewall architecture that works at the network layer and keeps track of packet activity. Stateful inspection has the capability to keep track of the state of the connection. For example, if a Domain Name System (DNS) reply is being sent into the network, stateful inspection can check to see whether a DNS request had previously been sent, because replies only follow requests. Should evidence of a request not be found by stateful inspection, the device will know that the DNS packet should not be allowed in and is potentially malicious.“ (CEHsntos 2022)
- static analysis The analysis of software that is performed without actually executing programs. Static analysis is different from dynamic analysis, which is analysis performed on programs while they are “running” or executing. Static analysis makes use of disassemblers and decompilers to format the data into a human-readable format. It is also a technique used in malware analysis.” (CEHsntos 2022)
- steganography A cryptographic method of hiding the existence of a message. A commonly used form of steganography places information in pictures.“ (CEHsntos 2022)
- symmetric algorithm A mathematical procedure in which both parties use the same cryptographic key.“ (CEHsntos 2022)
- symmetric encryption An encryption standard requiring that all parties have a copy of a shared key. A single key is used for both encryption and decryption.” (CEHsntos 2022)
- SYN flood attack A distributed denial-of-service (DDoS) attack in which the attacker sends a succession of SYN packets with a spoofed address to a targeted destination IP device but does not send the last ACK packet to acknowledge and confirm receipt. This leaves half-open connections between the client and the server until all resources are absorbed, rendering the server or targeted IP destination device unavailable because of resource allocation to this attack.“ (CEHsntos 2022)
T
- Trusted Computer System Evaluation Criteria (TCSEC) Also called the Orange Book, a system designed by the Department of Defense (DoD) to evaluate standalone systems. It places systems into one of four levels: A, B, C, or D. Its basis of measurement]] is confidentiality.“ (CEHsntos 2022)
U
- Uniform Resource Locator (URL) The global address on the Internet and World Wide Web in which domain names are used to resolve IP addresses.” (CEHsntos 2022)
V
- virus A computer program with the capability to generate copies of itself and thereby spread. Viruses require the interaction of an individual to activate and can have rather benign results, such as flashing a message to the screen, or rather malicious results that destroy data, systems, integrity, or availability.” (CEHsntos 2022)
- vulnerability assessment A methodical evaluation of an organization’s IT weaknesses of infrastructure components and assets and how those weaknesses can be mitigated through proper security controls and recommendations to remediate exposure to risks, threats, and vulnerabilities.“ (CEHsntos 2022)
- vulnerability management The overall responsibility and management of vulnerabilities within an organization and how that management of vulnerabilities will be achieved through dissemination of duties throughout the IT organization.” (CEHsntos 2022)
W
- Whois An Internet utility that returns information about the domain name and IP address.“ (CEHsntos 2022)
- written authorization - “One of the most important parts of the ethical hack. It gives you permission to perform the tests that have been agreed on by the client.” (CEHsntos 2022)
X
Y
Z
- zone transfer The mechanism used by Domain Name Service (DNS) servers to update each other by transferring a resource record. It should be a controlled process between two DNS servers but is something that hackers will attempt to perform to steal the organization’s DNS information. It can be used to map the network devices.” (CEHsntos 2022)
Fair Use Sources
Cybersecurity: DevSecOps - Security Automation, Cloud Security - Cloud Native Security (AWS Security - Azure Security - GCP Security - IBM Cloud Security - Oracle Cloud Security, Container Security, Docker Security, Podman Security, Kubernetes Security, Google Anthos Security, Red Hat OpenShift Security); CIA Triad (Confidentiality - Integrity - Availability, Authorization - OAuth, Identity and Access Management (IAM), JVM Security (Java Security, Spring Security, Micronaut Security, Quarkus Security, Helidon Security, MicroProfile Security, Dropwizard Security, Vert.x Security, Play Framework Security, Akka Security, Ratpack Security, Netty Security, Spark Framework Security, Kotlin Security - Ktor Security, Scala Security, Clojure Security, Groovy Security;
, JavaScript Security, HTML Security, HTTP Security - HTTPS Security - SSL Security - TLS Security, CSS Security - Bootstrap Security - Tailwind Security, Web Storage API Security (localStorage Security, sessionStorage Security), Cookie Security, IndexedDB Security, TypeScript Security, Node.js Security, NPM Security, Deno Security, Express.js Security, React Security, Angular Security, Vue.js Security, Next.js Security, Remix.js Security, PWA Security, SPA Security, Svelts.js Security, Ionic Security, Web Components Security, Nuxt.js Security, Z Security, htmx Security
Python Security - Django Security - Flask Security - Pandas Security,
Database Security (Database Security on Kubernetes, Database Security on Containers / Database Security on Docker, Cloud Database Security - DBaaS Security, Concurrent Programming and Database Security, Functional Concurrent Programming and Database Security, Async Programming and Databases Security, MySQL Security, Oracle Database Security, Microsoft SQL Server Security, MongoDB Security, PostgreSQL Security, SQLite Security, Amazon RDS Security, IBM Db2 Security, MariaDB Security, Redis Security, Cassandra Security, Amazon Aurora Security, Microsoft Azure SQL Database Security, Neo4j Security, Google Cloud SQL Security, Firebase Realtime Database Security, Apache HBase Security, Amazon DynamoDB Security, Couchbase Server Security, Elasticsearch Security, Teradata Database Security, Memcached Security, Amazon Redshift Security, SQLite Security, CouchDB Security, Apache Kafka Security, IBM Informix Security, SAP HANA Security, RethinkDB Security, InfluxDB Security, MarkLogic Security, ArangoDB Security, RavenDB Security, VoltDB Security, Apache Derby Security, Cosmos DB Security, Hive Security, Apache Flink Security, Google Bigtable Security, Hadoop Security, HP Vertica Security, Alibaba Cloud Table Store Security, InterSystems Caché Security, Greenplum Security, Apache Ignite Security, FoundationDB Security, Amazon Neptune Security, FaunaDB Security, QuestDB Security, Presto Security, TiDB Security, NuoDB Security, ScyllaDB Security, Percona Server for MySQL Security, Apache Phoenix Security, EventStoreDB Security, SingleStore Security, Aerospike Security, MonetDB Security, Google Cloud Spanner Security, SQream Security, GridDB Security, MaxDB Security, RocksDB Security, TiKV Security, Oracle NoSQL Database Security, Google Firestore Security, Druid Security, SAP IQ Security, Yellowbrick Data Security, InterSystems IRIS Security, InterBase Security, Kudu Security, eXtremeDB Security, OmniSci Security, Altibase Security, Google Cloud Bigtable Security, Amazon QLDB Security, Hypertable Security, ApsaraDB for Redis Security, Pivotal Greenplum Security, MapR Database Security, Informatica Security, Microsoft Access Security, Tarantool Security, Blazegraph Security, NeoDatis Security, FileMaker Security, ArangoDB Security, RavenDB Security, AllegroGraph Security, Alibaba Cloud ApsaraDB for PolarDB Security, DuckDB Security, Starcounter Security, EventStore Security, ObjectDB Security, Alibaba Cloud AnalyticDB for PostgreSQL Security, Akumuli Security, Google Cloud Datastore Security, Skytable Security, NCache Security, FaunaDB Security, OpenEdge Security, Amazon DocumentDB Security, HyperGraphDB Security, Citus Data Security, Objectivity/DB). Database drivers (JDBC Security, ODBC), ORM (Hibernate Security, Microsoft Entity Framework), SQL Operators and Functions Security, Database IDEs (JetBrains DataSpell Security, SQL Server Management Studio Security, MySQL Workbench Security, Oracle SQL Developer Security, SQLiteStudio),
Programming Language Security ((1. Python Security, 2. JavaScript Security, 3. Java Security, 4. C# Security, 5. C++ Security, 6. PHP Security, 7. TypeScript Security, 8. Ruby Security, 9. C Security, 10. Swift Security, 11. R Security, 12. Objective-C Security, 13. Scala Security, 14. Golang Security, 15. Kotlin Security, 16. Rust Security, 17. Dart Security, 18. Lua Security, 19. Perl Security, 20. Haskell Security, 21. Julia Security, 22. Clojure Security, 23. Elixir Security, 24. F# Security, 25. Assembly Language Security, 26. Shell Script Security / bash Security, 27. SQL Security, 28. Groovy Security, 29. PowerShell Security, 30. MATLAB Security, 31. VBA Security, 32. Racket Security, 33. Scheme Security, 34. Prolog Security, 35. Erlang Security, 36. Ada Security, 37. Fortran Security, 38. COBOL Security, 39. Lua Security, 40. VB.NET Security, 41. Lisp Security, 42. SAS Security, 43. D Security, 44. LabVIEW Security, 45. PL/SQL Security, 46. Delphi/Object Pascal Security, 47. ColdFusion Security, 49. CLIST Security, 50. REXX);
OS Security, Mobile Security: Android Security - Kotlin Security - Java Security, iOS Security - Swift Security; Windows Security - Windows Server Security, Linux Security (Ubuntu Security, Debian Security, RHEL Security, Fedora Security), UNIX Security (FreeBSD Security), IBM z Mainframe Security (RACF Security), Passwords (Windows Passwords, Linux Passwords, FreeBSD Passwords, Android Passwords, iOS Passwords, macOS Passwords, IBM z/OS Passwords), Passkeys, Hacking (Ethical Hacking, White Hat, Black Hat, Grey Hat), Pentesting (Red Team - Blue Team - Purple Team), Cybersecurity Certifications (CEH, GIAC, CISM, CompTIA Security Plus, CISSP), Mitre Framework, Common Vulnerabilities and Exposures (CVE), Cybersecurity Bibliography, Cybersecurity Courses, Firewalls, CI/CD Security (GitHub Actions Security, Azure DevOps Security, Jenkins Security, Circle CI Security), Functional Programming and Cybersecurity, Cybersecurity and Concurrency, Cybersecurity and Data Science - Cybersecurity and Databases, Cybersecurity and Machine Learning, Cybersecurity Glossary (RFC 4949 Internet Security Glossary), Awesome Cybersecurity, Cybersecurity GitHub, Cybersecurity Topics (navbar_security - see also navbar_aws_security, navbar_azure_security, navbar_gcp_security, navbar_k8s_security, navbar_docker_security, navbar_podman_security, navbar_mainframe_security, navbar_ibm_cloud_security, navbar_oracle_cloud_security, navbar_database_security, navbar_windows_security, navbar_linux_security, navbar_macos_security, navbar_android_security, navbar_ios_security, navbar_os_security, navbar_firewalls, navbar_encryption, navbar_passwords, navbar_iam, navbar_pentesting, navbar_privacy)
© 1994 - 2024 Cloud Monk Losang Jinpa or Fair Use. Disclaimers
SYI LU SENG E MU CHYWE YE. NAN. WEI LA YE. WEI LA YE. SA WA HE.