Ceziam's Glossary of Terms you Need to Know
Key Words General Definitions
Attack surface The attack surface of a software environment is the sum of the different points where an unauthorized user can try to enter data to or extract data from an environment. Keeping the attack surface as small as possible is a basic security measure.
Cyber Security Cyber security is the practice of ensuring the confidentiality, integrity and availability (CIA) of information.
Denial of Service (DoS) This is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
Domain The hierarchy of labels in a fully qualified domain name. A domain name is an identification string that defines a realm of administrative autonomy, authority or control within the Internet. For example “microsoft.com” is a domain name.
Hostname Is a label that is assigned to a device connected to a computer network and that is used to identify the device on the internet.
IP Address This is a numerical label assigned to each device connected to the internet.
Netrisk This is the overall risk prevalent in a computer system after the likelihood of the attack, impact and control effectiveness has been considered.
Port A computer port is a connection point or interface between a computer and an external or internal device.
Internet Protocol An Internet Protocol (IP for short) address is part of the systematically laid out interconnected grid that governs online communication by identifying both initiating devices and various Internet destinations, thereby making two-way communication possible.
Risk Something that could cause an organization not to meet one of its objectives.
Secure Access Control Controlling who has access to a computer or online service and the information it stores.
Security control safeguards or countermeasures to avoid, detect, counteract, or minimize security risks to physical property, information, computer systems, or other assets.
Service In multitasking computer operating systems, a service is a computer program that runs as a background process, rather than being under the direct control of an interactive user. It is also known as a daemon.
State State is commonly known as th status of a network socket. This gives an indication of the status of a socket interms of tcp/ip.
Subdomain A subdomain is a domain that is a part of a main domain.
Vulnerability A vulnerability is a weakness which can be exploited by a Threat Actor.