Dictionary

-A-

-B-

Base64 Encoder

Base64 is an encryption method that transforms data into what seems like a random string of numbers and letters. In doing so, this method changes the data size to 30% larger than its original, making the datas purpose slower than before. Because of this, base64 is seen as a last resort and should only be used when absolutely necessary. This encryption method splits the data into parts of 6 bits and converts them into a binary sequence that represents a character of a very limited set. Base64 is good to use for systems that are ASCII restricted, for older systems that are only 7 bit or when characters have special meanings. Ends with a series of = and may start with b


Binary Exploitations

Binary exploitations is the process of exploiting memory and vulnerabilities in a computer system to gain access to restricted areas of the computer or to force it to perform tasks that it was not initially designed for. This allows for an attacker to change the way programs on the computer work, give themselves greater privileges than the computer owner or to install and run malicious software.

-C-

Cryptography

Cryptography is the art of changing the way information looks by hiding or encoding it to ensure that only someone with a key to undo the change can view it, used frequently in banking, passwords, ecommerce, virtual communication over networks, etc. Quantum algorithms and or ciphers are used to encrypt or decrypt the information. Skills required for cryptography include computer science, engineering and mathematics. Apparently cryptography can be found as far back as the ancient egyptians. Cryptography is important for privacy, confidentiality and authentication.


Cryptomining

Cryptomining is when special computer components are used to help add to a blockchain, which is a digital database. By adding to the blockchain, transitions can be tracked and validated with the intention of generating new bitcoin that can be claimed.

-D-

-E-

-F-

Firewall

A firewall is a network security device in the form of software or hardware that regulates internal and external networks in terms of internet traffic. Firewalls protect networks from unauthorized access, harmful activity and potential threats by examining network packets.


Forensics

Forensics in the world of cybersecurity is the act of investigating cybercrime while collecting a variety of digital evidence of an attack. Their job is to respond to incidents and assist in lowering the change or another happening.

-G-

-H-

-I-

Internet Service Provider

Internet service providers are organizations that provide the hardware necessary for users to access the internet. They manage all the traffic and connections to the internet while allowing homes to have their own private network. Examples of internet service providers are Cogeco, Bell, Oxio, Ebox, Internet Atlantic, etc.

-J-

-K-

-L-

-M-

Malware

Malware, which is formally known as malicious software, is software that is created with the intention of harming or compromising a person’s device. This could be with the intention of gaining money, information, or power towards an organization. Ways that someone could become infected with malware is by clicking suspicious links or downloading pirated softwares or media online.

-N-

Network Packets

Network packets is the way that data travels through the internet. Data or messages to computers is broken up into small fragments called packets that the computer reassembles once they are received.

-O-

-P-

Port

A port is a channel. There can be a service hosted on a port. An analogy that could be used to better understand what a port is, is if an IP address was an apartment building, the port would be a singular room number.


Proxy Server

Proxy servers are services that are the middleman between a client and the internet. They act as a protector from outside threats and help mitigate cyberattacks.

-Q-

-R-

Reverse Engineering

Reverse engineering is the process of (in a cybersecurity context), closely and attentively taking apart systems and or softwares to learn how it works. It is used for understanding software vulnerabilities, putting defences up against vulnerabilities and analyzing malware.


Rot13

Rot13 is a type of letter substitution cipher where every letter is replaced with the 13th letter in the alphabet after itself (Ex: A gets turned into N)


RSA

RSA stands for “Rivest-Shamir-Adleman” which is an encryption algorithm that is popular among many products. The algorithm that is used to encrypt the data is called an asymmetric algorithm, which uses mathematical techniques to conceal the data. It uses a private and public key to encrypt and decrypt the data. “If the public key is used for encryption, the private key must be used to decrypt the data” and vice versa. This helps with making recipients of the data intentional because only they will have the other key that decrypts the data. Typically, the public key is used when decrypting the data to verify the identity of the sender, however this form of transaction is vulnerable. This is due to the information being easily open to manipulation through internet traffic. The mathematical technique used is multiplying two large prime numbers to get an even larger number, and the private and public keys use those same prime numbers to multiply to another larger number, however the factoring of the first large number is difficult to perform due to the amount of bits that the encrypted data consumes in storage. N is the result of the numbers being multiplied. C is the ciphered data. E is the encryption key.

-S-

Sandboxing

Sandboxing allows computer systems to avoid compatibility issues with its operating systems by running everything under one virtualized operating system.

-T-

Throughput Capabilities

Throughput capabilities is what is used to describe the amount of data that is being transmitted from a firewall in megabytes per second (mbps) or gigabytes per second (gbps).

-U-

Uniform Resource Locator (URL)

URL or a uniform resource locator, is a mechanic used by web browsers to determine the address of a specific website or published resource. URLs are in theory unique, however it is the job of the website owner to ensure that the URL properly works towards their website.

-V-

Virtual Private Network

A virtual private network is the intentional encryption of data to act as a middle man between the internet and a user’s device.

-W-

Web Crawlers

Web crawlers or bots are computer programs that scour websites so that search engines can have access to them.


Web Exploitation

Web exploitation is the exploitation of vulnerabilities in web based applications to steal personal and sensitive data or to take over the application.

-X-

-Y-

-Z-