Vocab
Technology
Security Tools and Software
Hacking
100

Interrelated components working together to collect, process, store, and disseminate information. This includes a feedback mechanism to monitor and control its operation.

What is information systems?

100

Enables remote users to access computing and storage devices and share data

What is a VPN?

100

This network security device acts as a barrier between a trusted network and untrusted external networks, monitoring and filtering traffic based on security policies.

What is a firewall?

100

The act of fraudulently using email to try to get the recipient to reveal personal data

What is phishing?

200

Confidentiality, Integrity, Availability 

What is CIA triad?

200

Well-designed, organized, and carefully managed collection of data

What is a database?
200

This security solution collects and analyzes log data from various network and security devices to detect and respond to security incidents in real-time.

What is a Security Information and Event Management (SIEM) system?

200

This type of cyberattack floods a network or website with excessive traffic, making it slow or unavailable for legitimate users.

What is a Distributed Denial of Service (DDoS) attack?

300

Cyberattack vector or technique that takes advantage of an unknown or unaddressed security flaw in computer software, hardware or firmware

What is a zero-day exploit?

300

A network of physical objects (i.e., things) that are embedded with sensors, processors, software, and network connectivity capability

What is IoT?

300

This type of penetration testing is often performed without prior knowledge of the target system's environment or defenses.

What is black-box testing?

300

This type of malicious software is designed to block access to a computer system or files until a sum of money is paid to the attacker.

What is ransomware?

400

A harmful program that resides in the active memory of the computer and duplicates itself

What is a worm?

400

This test attempts to determine whether a computer can successfully impersonate a human

What is the Turing test?

400

This open-source tool is commonly used in penetration testing to automate tasks like vulnerability scanning, reporting, and exploitation.

What is Metasploit?

400

This hacking technique involves analyzing and manipulating data packets in transit between two parties, often used for eavesdropping on communication.

What is packet sniffing?

500

Iterative process that develops the system in “sprint” increments lasting from two weeks to two months

What is Agile Development?

500

It's a cryptographic technique used to secure communication over the internet, ensuring data sent between a user's browser and a website remains private and cannot be intercepted easily.

What is SSL/TLS (Secure Sockets Layer/Transport Layer Security)?

500

This well-known web hacking tool is often used for scanning and identifying vulnerabilities in web applications.

What is Burp Suite?

500

A type of web attack where an attacker inserts malicious SQL code into an input field to manipulate a web application's database.

What is SQL Injection?