Everything you need to know to understand CyberLite Issue 16. Read the issue here.
Zero-Day: Vulnerabilities that are unknown to the parties responsible for patching or fixing them.
Botnet: A botnet is a collection of internet-connected devices, which may include PCs, servers and mobile devices that are infected and controlled by the same malware e.g. Emotet. Botnets are commonly used to carry out DDoS attacks.
Ransomware: Ransomware blocks access to a computer system until a sum of money is paid. It does this by encrypting all of the victim’s files. It’s increasingly common for criminals to now threaten to leak the files they’ve encrypted online to further encourage victims to pay the ransom.
Cryptocurrency: This is a far too complicated topic to summarise into a quick definition; if I did it wouldn’t do it justice. So here’s a great youtube video from SciShow.
Internet of Things (IoT): The network of physical objects - “things” that are embedded with sensors, software, and other technologies for connecting and exchanging data over the Internet.
CVSS (Common Vulnerability Scoring System) Score: This score gives an indication of how severe a vulnerability is. The score takes into account lots of different metrics such as the complexity, impact, and whether or not a fix is available. A full list of the metrics used can be found here.