Q 8HGJKSWKvlbOKLdTtkg Google-Cybersecurity-Certificate-glossary
Q 8HGJKSWKvlbOKLdTtkg Google-Cybersecurity-Certificate-glossary
Q 8HGJKSWKvlbOKLdTtkg Google-Cybersecurity-Certificate-glossary
Cybersecurity
A
Absolute file path: The full file path, which starts from the root
Active packet sniffing: A type of attack where data packets are manipulated in
transit
Address Resolution Protocol (ARP): A network protocol used to determine the MAC
address of the next router or device on the path
Assess: The fifth step of the NIST RMF that means to determine if established controls
are implemented correctly
Asset management: The process of tracking assets and the risks that affect them
Asymmetric encryption: The use of a public and private key pair for encryption and
decryption of data
Attack surface: All the potential vulnerabilities that a threat actor could exploit
Authorize: The sixth step of the NIST RMF that refers to being accountable for the
security and privacy risks that might exist in an organization
Automation: The use of technology to reduce human and manual effort to perform
common and repetitive tasks
Availability: The idea that data is accessible to those who are authorized to access it
B
Baiting: A social engineering tactic that tempts people into compromising their
security
Basic auth: The technology used to establish a user’s request to access a server
Biometrics: The unique physical characteristics that can be used to verify a person’s
identity
Boolean data: Data that can only be one of two values: either True or False
Botnet: A collection of computers infected by malware that are under the control of a
single threat actor, known as the “bot-herder"
Brute force attack: The trial and error process of discovering private information
Bug bounty: Programs that encourage freelance hackers to find and report
vulnerabilities
Built-in function: A function that exists within Python and can be called directly
Business continuity: An organization's ability to maintain their everyday productivity
by establishing risk disaster recovery plans
Business continuity plan (BCP): A document that outlines the procedures to sustain
business operations during and after a significant disruption
Business Email Compromise (BEC): A type of phishing attack where a threat actor
impersonates a known source to obtain financial advantage
C
Categorize: The second step of the NIST RMF that is used to develop risk
management processes and tasks
Cloud-based firewalls: Software firewalls that are hosted by the cloud service
provider
Cloud computing: The practice of using remote servers, applications, and network
services that are hosted on the internet instead of on local physical devices
Cloud network: A collection of servers or computers that stores resources and data
in remote data centers that can be accessed via the internet
Cloud security: The process of ensuring that assets stored in the cloud are properly
configured and access to those assets is limited to authorized users
Command and control (C2): The techniques used by malicious actors to maintain
communications with compromised systems
Command-line interface (CLI): A text-based user interface that uses commands to
interact with the computer
Comment: A note programmers make about the intention behind their code
Common Event Format (CEF): A log format that uses key-value pairs to structure
data and identify fields and their corresponding values
Computer virus: Malicious code written to interfere with computer operations and
cause damage to data and software
Confidentiality: The idea that only authorized users can access specific assets or
data
Confidential data: Data that often has limits on the number of people who have
access to it
Confidentiality, integrity, availability (CIA) triad: A model that helps inform how
organizations consider risk when setting up systems and security policies
Controlled zone: A subnet that protects the internal network from the uncontrolled
zone
Cross-site scripting (XSS): An injection attack that inserts code into a vulnerable
website or web application
D
Data: Information that is translated, processed, or stored by a computer
Data controller: A person that determines the procedure and purpose for processing
data
Data custodian: Anyone or anything that’s responsible for the safe handling,
transport, and storage of information
Data packet: A basic unit of information that travels from one device to another
within a network
Data processor: A person that is responsible for processing data on behalf of the
data controller
Data protection officer (DPO): An individual that is responsible for monitoring the
compliance of an organization's data protection procedures
Debugger: A software tool that helps to locate the source of an error and assess its
causes
Denial of service (DoS) attack: An attack that targets a network or server and floods
it with network traffic
Detect: A NIST core function related to identifying potential security incidents and
improving monitoring capabilities to increase the speed and efficiency of detections
Digital certificate: A file that verifies the identity of a public key holder
Digital forensics: The practice of collecting and analyzing data to determine what has
happened after an attack
Disaster recovery plan: A plan that allows an organization’s security team to outline
the steps needed to minimize the impact of a security incident
Distributed denial of service (DDoS) attack: A type of denial or service attack that
uses multiple devices or servers located in different locations to flood the target
network with unwanted traffic
Documentation: Any form of recorded content that is used for a specific purpose
DOM-based XSS attack: An instance when malicious script exists in the webpage a
browser loads
Domain Name System (DNS): A networking protocol that translates internet domain
names into IP addresses
E
Elevator pitch: A brief summary of your experience, skills, and background
Eradication: The complete removal of the incident elements from all affected
systems
Escalation policy: A set of actions that outline who should be notified when an
incident alert occurs and how that incident should be handled
Exception: An error that involves code that cannot be executed even though it is
syntactically correct
Exclusive operator: An operator that does not include the value of comparison
External threat: Anything outside the organization that has the potential to harm
organizational assets
F
False negative: A state where the presence of a threat is not detected
Fileless malware: Malware that does not need to be installed by the user because it
uses legitimate programs that are already installed to infect a computer
Forward proxy server: A server that regulates and restricts a person’s access to the
internet
G
Global variable: A variable that is available through the entire program
Graphical user interface (GUI): A user interface that uses icons on the screen to
manage different tasks on the computer
H
Hacker: Any person or group who uses computers to gain unauthorized access to
data
Hash collision: An instance when different inputs produce the same hash value
Hash table: A data structure that's used to store and reference hash values
Health Insurance Portability and Accountability Act (HIPAA): A U.S. federal law
established to protect patients’ health information
Hub: A network device that broadcasts information to every device on the network
I
Identify: A NIST core function related to management of cybersecurity risk and its
effect on an organization’s people and assets
Identity and access management (IAM): A collection of processes and technologies
that helps organizations manage digital identities in their environment
IEEE 802.11 (Wi-Fi): A set of standards that define communication for wireless LANs
Immutable: An object that cannot be changed after it is created and assigned a value
Implement: The fourth step of the NIST RMF that means to implement security and
privacy plans for an organization
Incident response plan: A document that outlines the procedures to take in each
step of incident response
Index: A number assigned to every element in a sequence that indicates its position
Indicators of attack (IoA): The series of observed events that indicate a real-time
incident
Input validation: Programming that validates inputs from users and other programs
Integer data: Data consisting of a number that does not include a decimal point
Integrity: The idea that the data is correct, authentic, and reliable
Internet Control Message Protocol flood (ICMP flood): A type of DoS attack
performed by an attacker repeatedly sending ICMP request packets to a network
server
Internet Protocol (IP): A set of standards used for routing and addressing data
packets as they travel between devices on a network
Internet Protocol (IP) address: A unique string of characters that identifies the
location of a device on the internet
Intrusion detection system (IDS): An application that monitors system activity and
alerts on possible intrusions
Intrusion prevention system (IPS): An application that monitors system activity for
intrusive activity and takes action to stop the activity
K
KALI LINUX ™: An open-source distribution of Linux that is widely used in the security
industry
Kernel: The component of the Linux OS that manages processes and memory
Key-value pair: A set of data that represents two linked items: a key, and its
corresponding value
L
Legacy operating system: An operating system that is outdated but still being used
Lessons learned meeting: A meeting that includes all involved parties after a major
incident
Library: A collection of modules that provide code users can access in their programs
List concatenation: The concept of combining two lists into one by placing the
elements of the second list directly after the elements of the first list
List data: Data structure that consists of a collection of data in sequential form
Loader: Malicious code that launches after a user initiates a dropper program
Local Area Network (LAN): A network that spans small areas like an office building, a
school, or a home
Logic error: An error that results when the logic used in code produces unintended
results
Log management: The process of collecting, storing, analyzing, and disposing of log
data
Loop condition: The part of a loop that determines when the loop terminates
M
Malware: Software designed to harm devices or networks
Malware infection: An incident type that occurs when malicious software designed to
disrupt a system infiltrates an organization’s computers or network
Metrics: Key technical attributes such as response time, availability, and failure rate,
which are used to assess the performance of a software application
Modem: A device that connects your router to the internet and brings internet access
to the LAN
Module: A Python file that contains additional functions, variables, classes, and any
kind of runnable code
Monitor: The seventh step of the NIST RMF that means be aware of how systems are
operating
N
nano: A command-line file editor that is available by default in many Linux
distributions
Network log analysis: The process of examining network logs to identify events of
interest
Network protocol analyzer (packet sniffer): A tool designed to capture and analyze
data traffic within a network
Network segmentation: A security technique that divides the network into segments
O
OAuth: An open-standard authorization protocol that shares designated access
between applications
Object: A data type that stores data in a comma-separated list of key-value pairs
On-path attack: An attack where a malicious actor places themselves in the middle of
an authorized connection and intercepts or alters the data in transit
Operating system (OS): The interface between computer hardware and the user
Order of volatility: A sequence outlining the order of data that must be preserved
from first to last
OWASP Top 10: A globally recognized standard awareness document that lists the
top 10 most critical security risks to web applications
P
Package: A piece of software that can be combined with other packages to form an
application
Package manager: A tool that helps users install, manage, and remove packages or
applications
Packet capture (P-cap): A file containing data packets intercepted from an interface
or network
Packet sniffing: The practice of capturing and inspecting data packets across a
network
Parameter (Python): An object that is included in a function definition for use in that
function
Patch update: A software and operating system update that addresses security
vulnerabilities within a program or product
Payment Card Industry Data Security Standards (PCI DSS): Any cardholder data
that an organization accepts, transmits, or stores
Penetration test (pen test): A simulated attack that helps identify vulnerabilities in
systems, networks, websites, applications, and processes
PEP 8 style guide: A resource that provides stylistic guidelines for programmers
working in Python
Peripheral devices: Hardware components that are attached and controlled by the
computer system
Phishing: The use of digital communications to trick people into revealing sensitive
data or deploying malicious software
Physical attack: A security incident that affects not only digital but also physical
environments where the incident is deployed
Port: A software-based location that organizes the sending and receiving of data
between devices on a network
Port filtering: A firewall function that blocks or allows certain port numbers to limit
unwanted communication
Prepare: The first step of the NIST RMF related to activities that are necessary to
manage security and privacy risks before a breach occurs
Principle of least privilege: The concept of granting only the minimal access and
authorization required to complete a task or function
Programming: A process that can be used to create a specific set of instructions for
a computer to execute tasks
Protect: A NIST core function used to protect an organization through the
implementation of policies, procedures, training, and tools that help mitigate
cybersecurity threats
Protected health information (PHI): Information that relates to the past, present, or
future physical or mental health or condition of an individual
Protecting and preserving evidence: The process of properly working with fragile
and volatile digital evidence
Proxy server: A server that fulfills the requests of its clients by forwarding them to
other servers
Public data: Data that is already accessible to the public and poses a minimal risk to
the organization if viewed or shared by others
Public key infrastructure (PKI): An encryption framework that secures the exchange
of online information
Python Standard Library: An extensive collection of Python code that often comes
packaged with Python
Q
Query: A request for data from a database table or a combination of tables
Quid pro quo: A type of baiting used to trick someone into believing that they’ll be
rewarded in return for sharing access, information, or money
R
Rainbow table: A file of pre-generated hash values and their associated plaintext
Rapport: A friendly relationship in which the people involved understand each other’s
ideas and communicate well with each other
Recover: A NIST core function related to returning affected systems back to normal
operation
Red Hat® Enterprise Linux® (also referred to simply as Red Hat in this course): A
subscription-based distribution of Linux built for enterprise use
Reflected XSS attack: An instance when malicious script is sent to a server and
activated during the server’s response
Relational database: A structured database containing tables that are related to each
other
Relative file path: A file path that starts from the user's current directory
Replay attack: A network attack performed when a malicious actor intercepts a data
packet in transit and delays it or repeats it at another time
Resiliency: The ability to prepare for, respond to, and recover from disruptions
Respond: A NIST core function related to making sure that the proper procedures are
used to contain, neutralize, and analyze security incidents, and implement
improvements to the security process
Return statement: A Python statement that executes inside a function and sends
information back to the function call
Reverse proxy server: A server that regulates and restricts the internet's access to
an internal server
Risk: Anything that can impact the confidentiality, integrity, or availability of an asset
Risk mitigation: The process of having the right procedures and rules in place to
quickly reduce the impact of a risk like a breach
S
Salting: An additional safeguard that’s used to strengthen hash functions
Scareware: Malware that employs tactics to frighten users into infecting their device
Secure File Transfer Protocol (SFTP): A secure protocol used to transfer files from
one device to another over a network
Secure shell (SSH): A security protocol used to create a shell with a remote system
Security frameworks: Guidelines used for building plans to help mitigate risk and
threats to data and privacy
Security governance: Practices that help support, define, and direct security efforts
of an organization
Security mindset: The ability to evaluate risk and constantly seek out and identify the
potential or actual breach of a system, application, or data
Security operations center (SOC): An organizational unit dedicated to monitoring
networks, systems, and devices for security threats or attacks
Security zone: A segment of a company’s network that protects the internal network
from the internet
Select: The third step of the NIST RMF that means to choose, customize, and capture
documentation of the controls that protect an organization
Sensitive data: A type of data that includes personally identifiable information (PII),
sensitive personally identifiable information (SPII), or protected health information
(PHI)
Sensitive personally identifiable information (SPII): A specific type of PII that falls
under stricter handling guidelines
Separation of duties: The principle that users should not be given levels of
authorization that would allow them to misuse a system
Session: a sequence of network HTTP requests and responses associated with the
same user
Session cookie: A token that websites use to validate a session and determine how
long that session should last
Session ID: A unique token that identifies a user and their device while accessing a
system
Shared responsibility: The idea that all individuals within an organization take an
active role in lowering risk and maintaining both physical and virtual security
Single sign-on (SSO): A technology that combines several different logins into one
Smishing: The use of text messages to trick users to obtain sensitive information or to
impersonate a known source
Social media phishing: A type of attack where a threat actor collects detailed
information about their target on social media sites before initiating the attack
Spear phishing: A malicious email attack targeting a specific user or group of users,
appearing to originate from a trusted source
Speed: The rate at which a device sends and receives data, measured by bits per
second
Splunk Cloud: A cloud-hosted tool used to collect, search, and monitor log data
Spyware: Malware that’s used to gather and sell information without consent
Stateful: A class of firewall that keeps track of information passing through it and
proactively filters out threats
Stateless: A class of firewall that operates based on predefined rules and that does
not keep track of information from data packets
Stored XSS attack: An instance when malicious script is injected directly on the
server
Style guide: A manual that informs the writing, formatting, and design of documents
Synchronize (SYN) flood attack: A type of DoS attack that simulates a TCP/IP
connection and floods a server with SYN packets
Syntax: The rules that determine what is correctly structured in a computing language
T
Tailgating: A social engineering tactic in which unauthorized people follow an
authorized person into a restricted area
TCP/IP model: A framework used to visualize how data is organized and transmitted
across a network
Threat modeling: The process of identifying assets, their vulnerabilities, and how
each is exposed to threats
Transferable skills: Skills from other areas that can apply to different careers
Tuple data: Data that consists of a collection of data that cannot be changed
Type error: An error that results from using the wrong data type
U
Ubuntu: An open-source, user-friendly distribution that is widely used in security and
other industries
Unauthorized access: An incident type that occurs when an individual gains digital or
physical access to a system or application without permission
USB baiting: An attack in which a threat actor strategically leaves a malware USB stick
for an employee to find and install to unknowingly infect a network
User Datagram Protocol (UDP): A connectionless protocol that does not establish a
connection between devices before transmissions
User-defined function: A function that programmers design for their specific needs
User interface: A program that allows the user to control the functions of the
operating system
User provisioning: The process of creating and maintaining a user's digital identity
V
Variable: A container that stores data
Virtual Private Network (VPN): A network security service that changes your public
IP address and hides your virtual location so that you can keep your data private when
you are using a public network like the internet
Virus: Malicious code written to interfere with computer operations and cause
damage to data and software
VirusTotal: A service that allows anyone to analyze suspicious files, domains, URLs,
and IP addresses for malicious content
W
Watering hole attack: A type of attack when a threat actor compromises a website
frequently visited by a specific group of users
Wide Area Network (WAN): A network that spans a large geographic area like a city,
state, or country
Wi-Fi Protected Access (WPA): A wireless security protocol for devices to connect
to the internet
Wildcard: A special character that can be substituted with any other character
Worm: Malware that can duplicate and spread itself across systems on its own
Y
YARA-L: A computer language used to create rules for searching through ingested
log data
Z
Zero-day: An exploit that was previously unknown