CyberLite Issue 4 Explainer

Explainers Feb 9, 2021

Everything you need to know to understand CyberLite Issue 4. Read the issue here.

Zero-Day: Refers to vulnerabilities that are unknown to the parties responsible for patching or fixing them.

Open Source Software: Software that anyone can modify or share, as its design and source code are publicly accessible.

HTTP: "Hypertext Transfer Protocol." HTTP is the protocol used to transfer data over the web. HTTP is made up of different types of requests and responses. The type of request that’s most familiar is a GET request. An internet browser sends an HTTP GET request to a server to retrieve a webpage that is then displayed for you.

VPN: A virtual private network gives you online privacy and anonymity by creating a private network from a public Internet connection. VPNs mask your Internet protocol (IP) address so your online actions are virtually untraceable by your internet service provider.

Ransomware: Ransomware blocks access to a computer system until a sum of money is paid. It does this by encrypting all of the victim’s files. It’s increasingly common for criminals to now threaten to leak the files they’ve encrypted online to further encourage victims to pay the ransom.

Domain: A distinct subset of the internet with addresses sharing a common suffix or under the control of a particular organization or individual. For example, google.com is a domain, and drive.google.com is part of the google.com domain.

Sources: https://www.metacompliance.com/cyber-security-terminology/, https://www.codecademy.com/articles/http-requests, https://languages.oup.com/google-dictionary-en/

Oliver Kitchin

Cybersecurity consultant. Passionate about people, technology and the great outdoors. He/Him.

Great! You've successfully subscribed.
Great! Next, complete checkout for full access.
Welcome back! You've successfully signed in.
Success! Your account is fully activated, you now have access to all content.