Authentication - The process of identifying a user's identity, making sure that they can
have access to the system and/or files. This can be accomplished either by a password,
retina scan, or fingerprint scan, sometimes even a combination of the above.
Botnet - A network of computers that have been infected with a virus, and now are
working continuously in order to create security breaches.
DDoS - Using multiple hosts and users, hackers bombard a website with a tidal wave of
requests to such an extent that it locks up the system and forces it to temporarily shut
down.
Domain - A series of computers and associated peripherals (routers, printers,
scanners), that are all connected as one entity.
Encryption - Coding used to protect your information from hackers.
Malware - malicious software that damages or disables computer systems and gives
limited or full control of the systems to the creator for malicious activities such as theft or
fraud.
Spoofing - When a hacker changes the IP address of an email so that it seems to come
from a trusted source
Spyware - A type of malware that attackers install on a computer to secretly gather
information about its users without their knowledge.
Trojan Horse - A form of malware, this one a misleading computer program that looks
innocent, but in fact allows the hacker into your system via a back door, allowing them
to control your computer.
Virus - It infects a system by inserting itself into a file or executable program. Malware
which changes, corrupts, or destroys information, and is then passed on to other
systems, usually by otherwise benign means.
VPN - creates a safe and encrypted tunnel over a public network to securely send and
receive sensitive information. It creates a subnet by using key-based encryption for
secure communication between endpoints.
Worm - Malware that can reproduce itself for the purposes of spreading itself to other
computers in the network.
,Hack Value - The notion among hackers that something is worth doing or is interesting.
Vulnerability - An existence of a weakness, design, or implementation error that may
lead to compromising the security of the system.
Exploit - A breach of IT system security through vulnerabilities. It is the part the malware
that contains code or a sequence of commands that can take advantage of a bug or
vulnerability in a digital system or device.
Payload - Payload
Daisy Chaining - Gaining access to one network and/or computer to obtain information
that will enable them to gain access to multiple other computers and/or networks.
Doxing - Publishing personally identifiable information about an individual that was
obtain from public databases and social media.
Bot - A software application that can be remotely controlled to execute/automate
predefined tasks.
Information Security - A state of infrastructure and information well-being to keep the
possibility of theft, tampering, disruption of information and services kept tolerable and
low.
Confidentiality - The assurance that information is only accessible to authorized
individuals.
Integrity - The trustworthiness of preventing improper and unauthorized changes of data
or resources.
Availability - The assurance that the system which is responsible for the processing,
delivering and storing of information is accessible to the authorized users when
required.
Authenticity - Any data, communication or document characteristics which ensures the
quality of being genuine.
Non-Repudiation - Guarantees that an individual cannot later deny sending a message
and the recipient cannot deny receiving a message.
Cloud Computing - An on-demand delivery of IT capabilities where infrastructure and
applications are provided to subscribers as a metered service over a network.
Advanced Persistent Threats (APT) - An attack vector focuses on stealing data from a
victims machine without their knowledge.
,Cloud Computing Threats - An attack vector is a flaw in within a client's application
cloud which can enable attackers to access other client's data.
Insider Attacks - An attack is performed on a network or single computer by an
entrusted individual who has authorized access.
Web Application Threats - A security attack vector that threatens the performance of a
website and hampers its security to steal user credentials, set up a phishing site or
acquire private data by targeting web applications.
SHA-1 - A Secure Hashing Algorithm (SHA) that produces a 160-bit digest from a
message with a maximum length of (264 - 1) bits, and resembles the MD5 algorithm.
Software as a Service (SaaS) - Offers software to subscribers on-demand over the
internet.
Platform as a Service (PaaS) - Offers development tools, configuration management,
and deployment platforms on-demand that can be used by subscribers to develop
custom applications.
Infrastructure as a Service (IaaS) - Provides virtual machines and other abstracted
hardware and operating systems which may be controlled through a service API.
Identify as a Service (IDaaS) - Offers IAM services including SSO, MFA, IGA and
intelligence collection.
Security as a Service (SECaaS) - Provides Penetration testing, authentication, intrusion
detection, anti-malware, security incident, and event management services.
Container as a Service (CaaS) - Offers Virtualization of container engines, management
of containers, applications and clusters through a web portal or API.
Function as a Service (FaaS) - Provides a platform for developing, running and
managing application functionality for microservices.
Public Cloud - Services are rendered over a network that is open for public use.
Private Cloud - Cloud infrastructure is operated for a single organization only.
Community Cloud - Shared Infrastructure between several organizations from a specific
community with common concerns.
Hybrid Cloud - Combination of two or more clouds that remain unique entities but are
bound together, thereby offering the benefits of multiple deployment models.
, Multi Cloud - Dynamic heterogeneous environment that combines workloads across
multiple cloud vendors, managed via one proprietary interface to achieve long term
business goals.
Cloud Consumer - A person or organization that uses cloud computing services.
Cloud Provider - A person or organization that provides services to the interested
parties.
Cloud Carrier - Providing connectivity and transport services between cloud consumers
and providers.
Cloud Auditor - A party that can conduct independent assessment of cloud service
controls and taking an opinion thereon.
Cloud Broker - An entity that manages the use, performance and delivery of cloud
services, and maintains relationships between cloud providers and consumers.
Virtualization - The ability to run multiple operating systems on a single physical system.
or multiple instances of one operating system and share the underlining resources such
as a server, storage device or network.
Containers - Placed on the top of one physical server and host operating system, and
share the operating systems kernel binaries and libraries, thereby reducing the need for
reproducing the OS.
Docker - An open source technology used for developing, packaging and running
applications and all its dependencies in the form of containers, to ensure that the
application works in a seamless environment. It provides a PaaS through OS level
virtualization and delivers containerized software packages.
Kubernetes - An open source, portable, extensible, orchestration platform developed by
Google for managing containerized applications and microservices. It provides a
resilient framework for managing distributed containers, generating deployment
patterns, and performing failover and redundancy for the applications.
Network Sniffing - Interception and monitoring of network traffic which is being sent
between the two cloud nodes.
Packet Sniffers - Programs that capture data from information packets as they travel
over the Internet or company networks. Captured data is sifted to find confidential or
proprietary information.
Side Channel Attack - An attack where an attacker runs a virtual machine on the same
physical host as the victims virtual machine and takes advantage of the shared physical
resources (processor cache) to steal data ( cryptographic keys) from the victim.