Word of the Week

Secure Shell (SSH)

Week 23: Secure Shell (SSH) A program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another.

Kernel

Week 22: Kernel The essential center of a computer operating system, the core that provides basic services for all other parts of the operating system. A synonym is nucleus. A kernel can be contrasted with a shell, the outermost part of an operating system that...

S/Key

Week 21: S/Key A security mechanism that uses a cryptographic hash function to generate a sequence of 64-bit, one-time passwords for remote user login. The client generates a one-time password by applying the MD4 cryptographic hash function multiple times to the...

Null Session

Week 20: Null Session Known as Anonymous Logon, it is a way of letting an anonymous user retrieve information such as user names and shares over the network or connect without authentication. It is used by applications such as explorer.exe to enumerate shares on...

Netmask

Week 19: Netmask 32-bit number indicating the range of IP addresses residing on a single IP network/subnet/supernet. This specification displays network masks as hexadecimal numbers. For example, the network mask for a class C IP network is displayed as 0xffffff00....

DDoS

Week 18: DDoS An acronym that stands for distributed denial of service – a form of cyber attack. This attack aims to make a service such as a website unusable by “flooding” it with malicious traffic or data from multiple sources (often botnets).

Bot/Botnet

Week 17: Bot/Botnet A type of software application or script that performs tasks on command, allowing an attacker to take complete control remotely of an affected computer. A collection of these infected computers is known as a “botnet” and is controlled by the hacker...

Worms

Week 16: Worms A piece of malware that can replicate itself in order to spread the infection to other connected computers.

Trojan horse

Week 15: Trojan horse A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.

Ransomware

Week 14: Ransomware A form of malware that deliberately prevents you from accessing files on your computer – holding your data hostage. It will typically encrypt files and request that a ransom be paid in order to have them decrypted or recovered.

Kubernetes (k8s)

Kubernetes (k8s) is an open-source system for automating deployment, scaling, and management of containerized applications.

Kerberos

A system developed at the Massachusetts Institute of Technology that depends on passwords and symmetric cryptography (DES) to implement ticket-based, peer entity authentication service and access control service distributed in a client-server network environment.