Dictionary

-A-

-B-

Base64 Encoder

Base64 is an encryption method that transforms data into what seems like a random string of numbers and letters. In doing so, this method changes the data size to 30% larger than its original, making the data’s purpose slower than before. Because of this, base64 is seen as a last resort and should only be used when absolutely necessary. This encryption method splits the data into parts of 6 bits and converts them into a binary sequence that represents a character of a “very limited set”. Base64 is good to use for systems that are ASCII restricted, for older systems that are only 7 bit or when characters have special meanings. Ends with a series of “=” and may start with “b’”


Binary Exploitations

Binary exploitations is the process of exploiting memory and vulnerabilities in a computer system to gain access to restricted areas of the computer or to force it to perform tasks that it was not initially designed for. This allows for an attacker to change the way programs on the computer work, give themselves greater privileges than the computer owner or to install and run malicious software.

-C-

Cryptography

Cryptography is the art of changing the way information looks by hiding or encoding it to ensure that only someone with a key to undo the change can view it, used frequently in banking, passwords, ecommerce, virtual communication over networks, etc. Quantum algorithms and or ciphers are used to encrypt or decrypt the information. Skills required for cryptography include computer science, engineering and mathematics. Apparently cryptography can be found as far back as the ancient egyptians. Cryptography is important for privacy, confidentiality and authentication.

-D-

-E-

-F-

Firewall

A firewall is a network security device in the form of software or hardware that regulates internal and external networks in terms of internet traffic. Firewalls protect networks from unauthorized access, harmful activity and potential threats by examining network packets.


Forensics

Forensics in the world of cybersecurity is the act of investigating cybercrime while collecting a variety of digital evidence of an attack. Their job is to respond to incidents and assist in lowering the change or another happening.

-G-

-H-

-I-

-J-

-K-

-L-

-M-

-N-

-O-

-P-

Port

A port is a channel. There can be a service hosted on a port. An analogy that could be used to better understand what a port is, is if an IP address was an apartment building, the port would be a singular room number.

-Q-

-R-

Reverse Engineering

Reverse engineering is the process of (in a cybersecurity context), closely and attentively taking apart systems and or softwares to learn how it works. It is used for understanding software vulnerabilities, putting defences up against vulnerabilities and analyzing malware.


Rot13

Rot13 is a type of letter substitution cipher where every letter is replaced with the 13th letter in the alphabet after itself (Ex: A gets turned into N)


RSA

RSA stands for “Rivest-Shamir-Adleman” which is an encryption algorithm that is popular among many products. The algorithm that is used to encrypt the data is called an asymmetric algorithm, which uses mathematical techniques to conceal the data. It uses a private and public key to encrypt and decrypt the data. “If the public key is used for encryption, the private key must be used to decrypt the data” and vice versa. This helps with making recipients of the data intentional because only they will have the other key that decrypts the data. Typically, the public key is used when decrypting the data to verify the identity of the sender, however this form of transaction is vulnerable. This is due to the information being easily open to manipulation through internet traffic. The mathematical technique used is multiplying two large prime numbers to get an even larger number, and the private and public keys use those same prime numbers to multiply to another larger number, however the factoring of the first large number is difficult to perform due to the amount of bits that the encrypted data consumes in storage. N is the result of the numbers being multiplied. C is the ciphered data. E is the encryption key.

-S-

Sandboxing

Sandboxing allows computer systems to avoid compatibility issues with its operating systems by running everything under one virtualized operating system.

-T-

-U-

-V-

-W-

Web Crawlers

Web crawlers or bots are computer programs that scour websites so that search engines can have access to them.


Web Exploitation

Web exploitation is the exploitation of vulnerabilities in web based applications to steal personal and sensitive data or to take over the application.

-X-

-Y-

-Z-