Select Page

Word of the Week


Week 17: Bot/Botnet A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer. A collection of these infected computers is known as a “botnet” and is controlled by the hacker...


Week 16: Worms A piece of malware that can replicate itself in order to spread the infection to other connected computers.

Trojan horse

Week 15: Trojan horse A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.


Week 14: Ransomware A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.

Kubernetes (k8s)

Kubernetes (k8s) is an open-source system for automating deployment, scaling, and management of containerized applications.


A system developed at the Massachusetts Institute of Technology that depends on passwords and symmetric cryptography (DES) to implement ticket-based, peer entity authentication service and access control service distributed in a client-server network environment.


Jitter or Noise is the modification of fields in a database while preserving the aggregate characteristics of that make the database useful in the first place.

Inference Attack

Inference Attacks rely on the user to make logical connections between seemingly unrelated pieces of information.

Hash Functions

(cryptographic) hash functions are used to generate a one way “check sum” for a larger text, which is not trivially reversed. The result of this hash function can be used to validate if a larger file has been altered, without having to compare the larger files to each other. Frequently used hash functions are MD5 and SHA1.


The gethostbyaddr DNS query is when the address of a machine is known and the name is needed.

False Rejects

False Rejects are when an authentication system fails to recognize a valid user.


Cryptographic transformation of data (called “plaintext”) into a form (called “cipher text”) that conceals the data’s original meaning to prevent it from being known or used.