Malicious code capable of creating a backdoor
Trojan
Linux command to change permission settings
chmod
This device can provide electricity
UPS
Data recovery software
Recuva
Main cybersecurity factor
Human factor
Monitored and analyzed network traffic
Sniffing
Sw to search for information in file metadata
FOCA
Photo metadata exchange standard
EXIF
Attack to recover a key by testing all combinations
Brute force attack
Ensure that access to information is authorized.
Confidenciality
Won his first race after 17 years
Aleix Espargaró
Techniques of abuse of trust
Social engineering
Small text file created in browser
Cookie
Keystroke recovery software
Revealer Keylogger
Data about data
Metadata
Small image representation
thumbnail
Linux module to manage password policy
pwquality
High-end equipment UPS
ONLINE or DOUBLE CONVERSION
Young guys without great computer skills
lammers
Supplants the identity of a PC or telephone number
Spoofing
Ethical Hacker
White hat hacker
Network of infected computers
Zombie or Botnet Network
Used for discovering the link layer address
ARP
File system to active forwarding packets
/etc/sysctl.conf
Key combination to access recovery mode in Debian
SHIFT + ESC