CyberLite Issue 3 Explainer

Explainers Feb 2, 2021

Everything you need to know to understand CyberLite Issue 3. Read the issue here.

Botnet: A botnet is a collection of internet-connected devices, which may include PCs, servers and mobile devices that are infected and controlled by the same malware e.g. Emotet. Botnets are commonly used to carry out DDoS attacks.

Phishing: Phishing is a method of trying to gather personal information using deceptive e-mails and websites.

DDoS Attack: A distributed denial-of-service (DDoS) attack is a malicious attempt to disrupt normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

Zero-Day: Refers to vulnerabilities that are unknown to the parties responsible for patching or fixing them. In this week’s case, that party was Apple.

Spoofing: Disguising a communication from an unknown source as being from a known, trusted source.

NAT: Network Address Translation makes computers outside the local area network (LAN) see only one IP address, while computers within the network can see each system's unique address. While this aids in network security, it also limits the number of IP addresses needed by companies and organizations. Using NAT, even large companies with thousands of computers can use a single IP address for connecting to the Internet. Source:

Oliver Kitchin

Cybersecurity consultant. Passionate about people, technology and the great outdoors. He/Him.

Great! You've successfully subscribed.
Great! Next, complete checkout for full access.
Welcome back! You've successfully signed in.
Success! Your account is fully activated, you now have access to all content.