Cyber Security Tools
Cyber Security Terminology
Port Number
OSI Model
100

This software is designed to find viruses and other harmful malware, including ransomware, worms, spyware, adware, and Trojans. Examples of tools include Norton 360, Bitdefender Antivirus, Norton AntiVirus, Kapersky Anti-Virus, and McAfee Total Protection.

Antivirus software

100

________ is a security protocol that is used for the purpose of encryption. It ensures privacy, data integrity, and authentication in the network like online transactions.

SSL encryption?

100

Ports 20 and 21

File Transfer Protocol (FTP)

100

This layer allows the transmission of raw data bits over a physical medium.

Physical layer


200

(formerly known as BackTrack Linux) is an open-source, Debian-based Linux distribution aimed at advanced Penetration Testing and Security Auditing.

Kali Linux

200

Any hacker who attempts to gain unauthorized access to a system with the intent to cause mischief, damage, or theft. They can be motivated by greed, a political agenda, or simply boredom.

Hacker, Black Hat

200

Port 22

Secure Shell (SSH)

200

This layer determines the format of the data in the network.

Datalink layer


300

A network infrastructure to prevent intrusions by hackers

Denies the malicious traffic

Does not deliver malicious packets if the traffic is from known threats in databases



IPS

300

The acronym stands for Distributed Denial of Service and is a favorite Black Hat tool. Using multiple hosts and users, hackers bombard a website with a tidal wave of requests to such an extent that it locks up the system and forces it to temporarily shut down.

DDoS 

300

Port 443

HTTP Secure (HTTPS)

300

It tells which path the data will take.

  • Network layer
400

A network infrastructure to detect intrusion by hackers


Flags invasions


Detects port scanners, malware, and other violations

IDS

400
  • Confidentiality: To protect sensitive information from unauthorized access.
  • Integrity: To protect data from deletion or modification by an unintended person.
  • Availability: To confirm the availability of the data whenever needed.

CIA Triad

400

Port 80

Hypertext Transfer Protocol (HTTP)

400

Data encryptions happen in this layer, and it ensures that the data is in a usable/presentable format.

Presentation layer


500

It is a fantastic network scanning tool that can give you detailed information about a target. This includes open ports, services, and the operating system running on the victim’s computer.

NMAP

500

What encryption type is only one key to encrypt and decrypt a message 


Algorithms: RC4, AES, DES, and 3DES

Usage For the transmission of large chunks of data  

Symmetric Encryption

500

Port 53

 Domain Name System (DNS)

500

This layer allows the transmission of data using TCP/UDP protocols.

Transport
M
e
n
u