# Google Cybersecurity Certificate glossary

##   


<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">A</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Absolute file path: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The full file path, which starts from the root</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Access controls:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Security controls that manage access, authorization, and accountability of information</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Active packet sniffing: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A <span style="background: white; mso-highlight: white;">type of attack where data packets are manipulated in transit</span></span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Address Resolution Protocol (ARP): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A network protocol used to determine the MAC address of the next router or device on the path</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Advanced persistent threat (APT): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">An instance when a threat actor maintains unauthorized access to a system for an extended period of time</span><span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Adversarial artificial intelligence (AI): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A technique that manipulates artificial intelligence (AI) and machine learning (ML) technology to conduct attacks more efficiently</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Adware: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A type of legitimate software that is sometimes used to display digital advertisements in applications</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Algorithm: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A set of rules used to solve a problem</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Analysis:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The investigation and validation of alerts</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Angler phishing:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;"> A technique where attackers impersonate customer service representatives on social media </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Anomaly-based analysis: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A detection method that identifies abnormal behavior</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Antivirus software: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A software program used to prevent, detect, and eliminate malware and viruses</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Application:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A program that performs a specific task</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Application programming interface (API) token: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A small block of encrypted code that contains information about a user</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Argument (Linux): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Specific information needed by a command</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Argument (Python): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The data brought into a function when it is called</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Array: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A data type that stores data in a comma-separated ordered list</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Assess: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The fifth step of the NIST RMF that means to determine if established controls are implemented correctly</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Asset:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An item perceived as having value to an organization </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Asset classification:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The practice of labeling assets based on sensitivity and importance to an organization</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Asset inventory:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A catalog of assets that need to be protected</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Asset management: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of tracking assets and the risks that affect them </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Asymmetric encryption:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The use of a public and private key pair for encryption and decryption of data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Attack surface: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">All the potential vulnerabilities that a threat actor could exploit</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Attack tree:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A diagram that maps threats to assets</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Attack vectors:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The pathways attackers use to penetrate security defenses </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Authentication:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The process of verifying who someone is</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Authorization:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The concept of granting access to specific resources in a system</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Authorize: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The sixth step of the NIST RMF that refers to being accountable for the security and privacy risks that might exist in an organization</span>

<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Automation:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The use of technology to reduce human and manual effort to perform common and repetitive tasks</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Availability:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;"> The idea that data is accessible to those who are authorized to access it</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">B</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Baiting: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A social engineering tactic that tempts people into compromising their security</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Bandwidth: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #222222;">The maximum data transmission capacity over a network, measured by bits per second</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Baseline configuration (baseline image): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A documented set of specifications within a system that is used as a basis for future builds, releases, and updates</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Bash:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The default shell in most Linux distributions</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Basic auth:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The technology used to establish a user’s request to access a server</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Basic Input/Output System (BIOS):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A microchip that contains loading instructions for the computer and is prevalent in older systems </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Biometrics: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">The unique physical characteristics that can be used to verify a person’s identity</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Bit: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The smallest unit of data measurement on a computer</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Boolean data: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data that can only be one of two values: either </span><span lang="EN" style="font-family: 'Courier New'; mso-fareast-font-family: 'Courier New'; background: #EFEFEF;">True</span><span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> or </span><span lang="EN" style="font-family: 'Courier New'; mso-fareast-font-family: 'Courier New'; background: #EFEFEF;">False</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Bootloader: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A software program that boots the operating system</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Botnet: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A collection of computers infected by malware that are under the control of a single threat actor, known as the “bot-herder"</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Bracket notation: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The indices placed in square brackets </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Broken chain of custody:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Inconsistencies in the collection and logging of evidence in the chain of custody</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Brute force attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The trial and error process of discovering private information </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Bug bounty: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Programs that encourage freelance hackers to find and report vulnerabilities</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Built-in function:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A function that exists within Python and can be called directly</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Business continuity: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An organization's ability to maintain their everyday productivity by establishing risk disaster recovery plans</span>

<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Business continuity plan (BCP): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A document that outlines the procedures to sustain business operations during and after a significant disruption</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Business Email Compromise (BEC): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A type of phishing attack where a threat actor impersonates a known source to obtain financial advantage</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">C</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Categorize: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The second step of the NIST RMF that is used to develop risk management processes and tasks</span>

<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">CentOS: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An open-source distribution that is closely related to Red Hat</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Central Processing Unit (CPU): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A computer’s main processor, which is used to perform general computing tasks on a computer</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Chain of custody:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The process of documenting evidence possession and control during an incident lifecycle</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Chronicle:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A cloud-native tool designed to retain, analyze, and search data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Cipher: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An algorithm that encrypts information</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Cloud-based firewalls:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Software firewalls that are hosted by the cloud service provider</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Cloud computing: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The practice of using remote servers, applications, and network services that are hosted on the internet instead of on local physical devices</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Cloud network:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A collection of servers or computers that stores resources and data in remote data centers that can be accessed via the internet</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Cloud security: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of ensuring that assets stored in the cloud are properly configured and access to those assets is limited to authorized users</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Command:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An instruction telling the computer to do something</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Command and control (C2): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The techniques used by malicious actors to maintain communications with compromised systems</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Command-line interface (CLI):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A text-based user interface that uses commands to interact with the computer</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Comment:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A note programmers make about the intention behind their code</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Common Event Format (CEF): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A log format that uses key-value pairs to structure data and identify fields and their corresponding values </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Common Vulnerabilities and Exposures (<span style="color: #444746;">CVE®</span>) list:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An openly accessible dictionary of known vulnerabilities and exposures</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Common Vulnerability Scoring System (CVSS): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A measurement system that scores the severity of a vulnerability</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Compliance: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of adhering to internal standards and external regulations</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Computer security incident response teams (CSIRT):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A specialized group of security professionals that are trained in incident management and response </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Computer virus:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Malicious code written to interfere with computer operations and cause damage to data and software</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Conditional statement: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A statement that evaluates code to determine if it meets a specified set of conditions</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Confidentiality:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The idea that only authorized users can access specific assets or data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Confidential data: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data that often has limits on the number of people who have access to it</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Confidentiality, integrity, availability (CIA) triad: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A model that helps inform how organizations consider risk when setting up systems and security policies</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Configuration file: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A file used to configure the settings of an application</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Containment:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The act of limiting and preventing additional damage caused by an incident</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Controlled zone: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A subnet that protects the internal network from the uncontrolled zone</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Cross-site scripting (XSS):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An injection attack that inserts code into a vulnerable website or web application</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Crowdsourcing: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The practice of gathering information using public input and collaboration</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Cryptographic attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An attack that affects secure forms of communication between a sender and intended recipient</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Cryptographic key: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A mechanism that decrypts ciphertext</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Cryptography: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of transforming information into a form that unintended readers can’t understand </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Cryptojacking:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A form of malware that installs software to illegally mine cryptocurrencies </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">CVE Numbering Authority (CNA):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An organization that volunteers to analyze and distribute information on eligible CVEs</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Cybersecurity (or security):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> <span style="background: white; mso-highlight: white;">The practice of ensuring confidentiality, integrity, and availability of information by protecting networks, devices, people, and data from unauthorized access or criminal exploitation</span></span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">D</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Information that is translated, processed, or stored by a computer</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data at rest: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data not currently being accessed</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Database: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An organized collection of information or data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data controller: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A person that determines the procedure and purpose for processing data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data custodian:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Anyone or anything that’s responsible for the safe handling, transport, and storage of information</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data exfiltration: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Unauthorized transmission of data from a system</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data in transit:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Data traveling from one point to another</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data in use:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Data being accessed by one or more users</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data owner: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The person who decides who can access, edit, use, or destroy their information</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data packet: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A basic unit of information that travels from one device to another within a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data point:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A specific piece of information</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data processor: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A person that is responsible for processing data on behalf of the data controller</span>

<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data protection officer (DPO): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">An individual that is responsible for monitoring the compliance of an organization's data protection procedures</span>

<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data type:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A category for a particular type of data item</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Date and time data:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Data representing a date and/or time</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Debugger:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A software tool that helps to locate the source of an error and assess its causes</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Debugging:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The practice of identifying and fixing errors in code</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Defense in depth: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A layered approach to vulnerability management that reduces risk</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Denial of service (DoS) attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An attack that targets a network or server and floods it with network traffic</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Detect: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A NIST core function related to identifying potential security incidents and improving monitoring capabilities to increase the speed and efficiency of detections</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Detection: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The prompt discovery of security events</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Dictionary data: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Data that consists of one or more key-value pairs</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Digital certificate: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A file that verifies the identity of a public key holder</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Digital forensics:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The practice of collecting and analyzing data to determine what has happened after an attack</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Directory: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A file that organizes where other files are stored</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Disaster recovery plan: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A plan that allows an organization’s security team to outline the steps needed to minimize the impact of a security incident</span>

<span lang="EN" style="font-size: 14.0pt; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Distributed denial of service (DDoS) attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A type of denial or service attack that uses multiple devices or servers located in different locations to flood the target network with unwanted traffic</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Distributions: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The different versions of Linux</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Documentation:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Any form of recorded content that is used for a specific purpose </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">DOM-based XSS attack:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An instance when malicious script exists in the webpage a browser loads</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Domain Name System (DNS):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A networking protocol that translates internet domain names into IP addresses</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Dropper: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A program or a file used to install a rootkit on a target computer</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">E</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Elevator pitch: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A brief summary of your experience, skills, and background</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Encapsulation: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A process performed by a VPN service that protects your data by wrapping sensitive data in other data packets</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Encryption: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of converting data from a readable format to an encoded format</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Endpoint:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Any device connected on a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Endpoint detection and response (EDR): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">An application that monitors an endpoint for malicious activity</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Eradication:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> <span style="background: white; mso-highlight: white;">The complete removal of the incident elements from all affected systems</span></span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Escalation policy: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A set of actions that outline who should be notified when an incident alert occurs and how that incident should be handled</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Event:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An observable occurrence on a network, system, or device</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Exception: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An error that involves code that cannot be executed even though it is syntactically correct</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Exclusive operator</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: An operator that does not include the value of comparison</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Exploit: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A way of taking advantage of a vulnerability</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Exposure:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A mistake that can be exploited by a threat</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">External threat:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Anything outside the organization that has the potential to harm organizational assets</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">F</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">False negative</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: A state where the presence of a threat is not detected</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> </span>**

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">False positive: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An alert that incorrectly detects the presence of a threat</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Fileless malware: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Malware that does not need to be installed by the user because it uses legitimate programs that are already installed to infect a computer</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">File path: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The location of a file or directory</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Filesystem Hierarchy Standard (FHS):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The component of the Linux OS that organizes data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Filtering:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Selecting data that match a certain condition</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Final report:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Documentation that provides a comprehensive review of an incident</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Firewall: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A network security device that monitors traffic to or from a network </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Float data: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data consisting of a number with a decimal point</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Foreign key: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A column in a table that is a primary key in another table</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Forward proxy server: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A server that regulates and restricts a person’s access to the internet</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Function:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A section of code that can be reused in a program</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">G</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Global variable:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> <span style="background: #FEFEFE;">A variable that is available through the entire program</span></span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Graphical user interface (GUI):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> <span style="background: #FEFEFE;">A user interface that uses icons on the screen to manage different tasks on the computer</span></span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">H</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Hacker: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Any person or group who uses computers to gain unauthorized access to data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Hacktivist: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A person who uses hacking to achieve a political goal</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Hard drive: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #3c4043; background: white; mso-highlight: white;">A hardware component used for long-term memory</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Hardware: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The physical components of a computer</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Hash collision: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">An instance when different inputs produce the same hash value</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Hash function: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An algorithm that produces a code that can’t be decrypted</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Hash table: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A data structure that's used to store and reference hash values</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Health Insurance Portability and Accountability Act (HIPAA): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A U.S. federal law established to protect patients’ health information</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Honeypot: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A system or resource created as a decoy vulnerable to attacks with the purpose of attracting potential intruders</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Host-based intrusion detection system (HIDS):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An application that monitors the activity of the host on which it’s installed </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Hub: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A network device that broadcasts information to every device on the network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Hypertext Transfer Protocol (HTTP): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An application layer protocol that provides a method of communication between clients and website servers</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Hypertext Transfer Protocol Secure (HTTPS): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A network protocol that provides a secure method of communication between clients and website servers</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">I</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Identify: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A NIST core function related to management of cybersecurity risk and its effect on an organization’s people and assets</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Identity and access management (IAM): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A collection of processes and technologies that helps organizations manage digital identities in their environment </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">IEEE 802.11 (Wi-Fi): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A set of standards that define communication for wireless LANs</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Immutable:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An object that cannot be changed after it is created and assigned a value</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Implement:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The fourth step of the NIST RMF that means to implement security and privacy plans for an organization</span>

<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Improper usage: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An incident type that occurs when an employee of an organization violates the organization’s acceptable use policies</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Incident:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An occurrence that actually or imminently jeopardizes, without lawful authority, the confidentiality, integrity, or availability of information or an information system; or constitutes a violation or imminent threat of violation of law, security policies, security procedures, or acceptable use policies</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Incident escalation</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: The process of identifying a potential security incident, triaging it, and handing it off to a more experienced team member</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Incident handler’s journal:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A form of documentation used in incident response</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Incident response: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An organization’s quick attempt to identify an attack, contain the damage, and correct the effects of a security breach</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Incident response plan:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A document that outlines the procedures to take in each step of incident response</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Inclusive operator: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">An operator that includes the value of comparison</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Indentation: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Space added at the beginning of a line of code</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Index:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A number assigned to every element in a sequence that indicates its position</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Indicators of attack (IoA):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The series of observed events that indicate a real-time incident</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Indicators of compromise (IoC):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Observable evidence that suggests signs of a potential security incident </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Information privacy: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The protection of unauthorized access and distribution of data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Information security (InfoSec):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The practice of keeping data in all states away from unauthorized users</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Injection attack:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Malicious code inserted into a vulnerable application</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Input validation:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Programming that validates inputs from users and other programs</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Integer data: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data consisting of a number that does not include a decimal point</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Integrated development environment (IDE): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A software application for writing code that provides editing assistance and error correction tools</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Integrity: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The idea that the data is correct, authentic, and reliable</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Internal hardware: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">The components required to run the computer</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Internal threat: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A current or former employee, external vendor, or trusted partner who poses a security risk</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Internet Control Message Protocol (ICMP): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">An internet protocol used by devices to tell each other about data transmission errors across the network </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Internet Control Message Protocol flood (ICMP flood): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A type of DoS attack performed by an attacker repeatedly sending ICMP request packets to a network server</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Internet Protocol (IP): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A set of standards used for routing and addressing data packets as they travel between devices on a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Internet Protocol (IP) address: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A unique string of characters that identifies the location of a device on the internet</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Interpreter: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A computer program that translates Python code into runnable instructions line by line</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Intrusion detection system (IDS): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An application that monitors system activity and alerts on possible intrusions</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Intrusion prevention system (IPS): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An application that monitors system activity for intrusive activity and takes action to stop the activity</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">IP spoofing: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A network attack performed when an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Iterative statement: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Code that repeatedly executes a set of instructions</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">K</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">KALI LINUX ™: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An open-source distribution of Linux that is widely used in the security industry</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Kernel:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The component of the Linux OS that manages processes and memory</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Key-value pair: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A set of data that represents two linked items:<span style="mso-spacerun: yes;"> </span>a key, and its corresponding value</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">L</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Legacy operating system: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An operating system that is outdated but still being used</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Lessons learned meeting:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;"> A meeting that includes all involved parties after a major incident</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Library: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A collection of modules that provide code users can access in their programs</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Linux: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An open-source operating system</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">List concatenation:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The concept of combining two lists into one by placing the elements of the second list directly after the elements of the first list</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">List data: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data structure that consists of a collection of data in sequential form</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Loader: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Malicious code that launches after a user initiates a dropper program</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Local Area Network (LAN): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A network that spans small areas like an office building, a school, or a home</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Local variable: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A variable assigned within a function</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Log:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A record of events that occur within an organization’s systems </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Log analysis:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The process of examining logs to identify events of interest </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Logging: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The recording of events occurring on computer systems and networks</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Logic error: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An error that results when the logic used in code produces unintended results</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Log management: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of collecting, storing, analyzing, and disposing of log data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Loop condition: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The part of a loop that determines when the loop terminates</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Loop variable: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A variable that is used to control the iterations of a loop</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">M</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Malware:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Software designed to harm devices or networks</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Malware infection</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: An incident type that occurs when malicious software designed to disrupt a system infiltrates an organization’s computers or network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Media Access Control (MAC) address: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A unique alphanumeric identifier that is assigned to each physical device on a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Method:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A function that belongs to a specific data type</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Metrics: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Key technical attributes such as response time, availability, and failure rate, which are used to assess the performance of a software application</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">MITRE:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A collection of non-profit research and development centers</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Modem: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A device that connects your router to the internet and brings internet access to the LAN</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Module</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: A Python file that contains additional functions, variables, classes, and any kind of runnable code</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Monitor</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: The seventh step of the NIST RMF that means be aware of how systems are operating</span>

<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Multi-factor authentication (MFA): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A security measure that requires a user to verify their identity in two or more ways to access a system or network</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">N</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">nano: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A command-line file editor that is available by default in many Linux distributions</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">National Institute of Standards and Technology (NIST) Incident Response Lifecycle:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A framework for incident response consisting of four phases: Preparation; Detection and Analysis; Containment, Eradication and Recovery, and Post-incident activity</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">National Institute of Standards and Technology (NIST) Special Publication (S.P.) 800-53: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A unified framework for protecting the security of information systems within the U.S. federal government</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Network: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A group of connected devices</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Network-based intrusion detection system (NIDS): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An application that collects and monitors network traffic and network data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Network data:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The data that’s transmitted between devices on a network </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Network Interface Card (NIC): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Hardware that connects computers to a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Network log analysis: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of examining network logs to identify events of interest</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Network protocol analyzer (packet sniffer):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> <span style="background: white; mso-highlight: white;">A tool designed to capture and analyze data traffic within a network</span></span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Network protocols: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A set of rules used by two or more devices on a network to describe the order of delivery and the structure of data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Network security: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The practice of keeping an organization's network infrastructure secure from unauthorized access</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Network segmentation: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A security technique that divides the network into segments</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Network traffic:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The amount of data that moves across a network </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Non-repudiation:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The concept that the authenticity of information can’t be denied</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Notebook: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An online interface for writing, storing, and running code</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Numeric data:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Data consisting of numbers</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">O</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">OAuth: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An open-standard authorization protocol that shares designated access between applications</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Object: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A data type that stores data in a comma-separated list of key-value pairs</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">On-path attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An attack where a malicious actor places themselves in the middle of an authorized connection and intercepts or alters the data in transit</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Open-source intelligence (OSINT): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">The collection and analysis of information from publicly available sources to generate usable intelligence</span><span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Open systems interconnection (OSI) model: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A standardized concept that describes the seven layers computers use to communicate and send data over the network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Open Web Application Security Project (OWASP): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A non-profit organization focused on improving software security</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: #FEFEFE;">Operating system (OS)</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: #FEFEFE;">: </span><span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The interface between computer hardware and the user</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Operator:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A symbol or keyword that represents an operation</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Options:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Input that modifies the behavior of a command</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Order of volatility:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;"> A sequence outlining the order of data that must be preserved from first to last</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">OWASP Top 10: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A globally recognized standard awareness document that lists the top 10 most critical security risks to web applications </span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">P</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Package: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A piece of software that can be combined with other packages to form an application</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Package manager: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A tool that helps users install, manage, and remove packages or applications</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Packet capture (P-cap): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A file containing data packets intercepted from an interface or network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Packet sniffing: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">The practice of capturing and inspecting data packets across a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Parameter (Python):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An object that is included in a function definition for use in that function</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Parrot: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An open-source distribution that is commonly used for security</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Parsing:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The process of converting data into a more readable format</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Passive packet sniffing: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A type of attack where a malicious actor connects to a network hub and looks at all traffic on the network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Password attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An attempt to access password secured devices, systems, networks, or data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Patch update: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A software and operating system update that addresses security vulnerabilities within a program or product</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Payment Card Industry Data Security Standards (PCI DSS): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Any cardholder data that an organization accepts, transmits, or stores</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Penetration test (pen test): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A simulated attack that helps identify vulnerabilities in systems, networks, websites, applications, and processes</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">PEP 8 style guide:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A resource that provides stylistic guidelines for programmers working in Python </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Peripheral devices: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Hardware components that are attached and controlled by the computer system</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Permissions: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The type of access granted for a file or directory</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Personally identifiable information (PII): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Any information used to infer an individual's identity</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Phishing: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The use of digital communications to trick people into revealing sensitive data or deploying malicious software</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Phishing kit: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A collection of software tools needed to launch a phishing campaign</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Physical attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A security incident that affects not only digital but also physical environments where the incident is deployed</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Physical social engineering: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An attack in which a threat actor impersonates an employee, customer, or vendor to obtain unauthorized access to a physical location</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Ping of death: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A type of DoS attack caused when a hacker pings a system by sending it an oversized ICMP packet that is bigger than 64KB </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Playbook: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A manual that provides details about any operational action</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Policy: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A set of rules that reduce risk and protect information</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Port: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A software-based location that organizes the sending and receiving of data between devices on a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Port filtering: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A firewall function that blocks or allows certain port numbers to limit unwanted communication</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Post-incident activity: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of reviewing an incident to identify areas for improvement during incident handling </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Potentially unwanted application (PUA):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A type of unwanted software that is bundled in with legitimate programs which might display ads, cause device slowdown, or install other software</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Private data</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">: Information that should be kept from the public</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Prepare: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The first step of the NIST RMF related to activities that are necessary to manage security and privacy risks before a breach occurs</span>

<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Prepared statement:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A coding technique that executes SQL statements before passing them on to a database</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Primary key:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A column where every row has a unique entry</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Principle of least privilege: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The concept of granting only the minimal access and authorization required to complete a task or function</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Privacy protection: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The act of safeguarding personal information from unauthorized use </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Procedures:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Step-by-step instructions to perform a specific security task</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Process of Attack Simulation and Threat Analysis (PASTA): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A popular threat modeling framework that’s used across many industries</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Programming:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;"> A process that can be used to create a specific set of instructions for a computer to execute tasks</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Protect: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A NIST core function used to protect an organization through the implementation of policies, procedures, training, and tools that help mitigate cybersecurity threats</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Protected health information (PHI): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Information that relates to the past, present, or future physical or mental health or condition of an individual</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Protecting and preserving evidence: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of properly working with fragile and volatile digital evidence</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Proxy server: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A server that fulfills the requests of its clients by forwarding them to other servers</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Public data</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">: Data that is already accessible to the public and poses a minimal risk to the organization if viewed or shared by others</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Public key infrastructure (PKI):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An encryption framework that secures the exchange of online information</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Python Standard Library: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An extensive collection of Python code that often comes packaged with Python</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">Q</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Query: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A request for data from a database table or a combination of tables</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Quid pro quo:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A type of baiting used to trick someone into believing that they’ll be rewarded in return for sharing access, information, or money</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">R</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Rainbow table:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A file of pre-generated hash values and their associated plaintext</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Random Access Memory (RAM): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #3c4043; background: white; mso-highlight: white;">A hardware component used for short-term memory</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Ransomware:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A malicious attack where threat actors encrypt an organization’s data and demand payment to restore access </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Rapport: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A friendly relationship in which the people involved understand each other’s ideas and communicate well with each other</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Recover: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A NIST core function related to returning affected systems back to normal operation</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Recovery:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The process of returning affected systems back to normal operations</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Red Hat® Enterprise Linux® </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">(also referred to simply as Red Hat in this course)**:** A subscription-based distribution of Linux built for enterprise use</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Reflected XSS attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An instance when malicious script is sent to a server and activated during the server’s response </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Regular expression (regex):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A sequence of characters that forms a pattern</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Regulations:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Rules set by a government or other authority to control the way something is done</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Relational database: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A structured database containing tables that are related to each other</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Relative file path: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A file path that starts from the user's current directory</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Replay attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #3c4043; background: white; mso-highlight: white;">A network attack performed when a malicious actor intercepts a data packet in transit and delays it or repeats it at another time</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Resiliency</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: <span style="background: white; mso-highlight: white;">The ability to prepare for, respond to, and recover from disruptions</span></span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Respond:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A NIST core function related to making sure that the proper procedures are used to contain, neutralize, and analyze security incidents, and implement improvements to the security process</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Return statement: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A Python statement that executes inside a function and sends information back to the function call</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Reverse proxy server: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A server that regulates and restricts the internet's access to an internal server</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Risk:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Anything that can impact the confidentiality, integrity, or availability of an asset</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Risk mitigation: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of having the right procedures and rules in place to quickly reduce the impact of a risk like a breach</span>

<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Root directory: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The highest-level directory in Linux</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Rootkit</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: <span style="background: white; mso-highlight: white;">Malware that provides remote, administrative access to a computer</span></span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Root user (or superuser): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A user with elevated privileges to modify the system</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Router: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A network device that connects multiple networks together</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">S</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Salting:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> <span style="background: white; mso-highlight: white;">An additional safeguard that’s used to strengthen hash functions</span></span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Scareware: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Malware that employs tactics to frighten users into infecting their device</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Search Processing Language (SPL)</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">: Splunk’s query language</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Secure File Transfer Protocol (SFTP): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A secure protocol used to transfer files from one device to another over a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Secure shell (SSH): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A security protocol used to create a shell with a remote system </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Security architecture: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A type of security design composed of multiple components, such as tools and processes, that are used to protect an organization from risks and external threats</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Security audit</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: A review of an organization's security controls, policies, and procedures against a set of expectations</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Security controls:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Safeguards designed to reduce specific security risks </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Security ethics:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Guidelines for making appropriate decisions as a security professional</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Security frameworks:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Guidelines used for building plans to help mitigate risk and threats to data and privacy</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Security governance: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Practices that help support, define, and direct security efforts of an organization</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Security hardening: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of strengthening a system to reduce its vulnerabilities and attack surface</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Security information and event management (SIEM)</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">: </span><span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An application that collects and analyzes log data to monitor critical activities in an organization</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Security mindset: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The ability to evaluate risk and constantly seek out and identify the potential or actual breach of a system, application, or data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Security operations center (SOC): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An organizational unit dedicated to monitoring networks, systems, and devices for security threats or attacks</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Security orchestration, automation, and response (SOAR): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A collection of applications, tools, and workflows that use automation to respond to security events</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Security posture:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An organization’s ability to manage its defense of critical assets and data and react to change</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Security zone: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A segment of a company’s network that protects the internal network from the internet</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Select</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: The third step of the NIST RMF that means to choose, customize, and capture documentation of the controls that protect an organization</span>

<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Sensitive data</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: <span style="background: white; mso-highlight: white;">A type of data that includes personally identifiable information (PII), sensitive personally identifiable information (SPII), or protected health information (PHI)</span></span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Sensitive personally identifiable information (SPII):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A specific type of PII that falls under stricter handling guidelines</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Separation of duties:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The principle that users should not be given levels of authorization that would allow them to misuse a system</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Session: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">a sequence of network HTTP requests and responses associated with the same user</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Session cookie:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A token that websites use to validate a session and determine how long that session should last</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Session hijacking:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An event when attackers obtain a legitimate user’s session ID</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Session ID: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A unique token that identifies a user and their device while accessing a system </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Set data: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Data that consists of an unordered collection of unique values</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Shared responsibility:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The idea that all individuals within an organization take an active role in lowering risk and maintaining both physical and virtual security</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Shell:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The command-line interpreter </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Signature: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A pattern that is associated with malicious activity</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Signature analysis:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A detection method used to find events of interest</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Simple Network Management Protocol (SNMP): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A network protocol used for monitoring and managing devices on a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Single sign-on (SSO):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A technology that combines several different logins into one</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Smishing</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: The use of text messages to trick users to obtain sensitive information or to impersonate a known source</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Smurf attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A network attack performed when an attacker sniffs an authorized user’s IP address and floods it with ICMP packets</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Social engineering: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A manipulation technique that exploits human error to gain private information, access, or valuables</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Social media phishing: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A type of attack where a threat actor collects detailed information about their target on social media sites before initiating the attack</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Spear phishing: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A malicious email attack targeting a specific user or group of users, appearing to originate from a trusted source</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Speed: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The rate at which a device sends and receives data, measured by bits per second</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Splunk Cloud: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A cloud-hosted tool used to collect, search, and monitor log data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Splunk Enterprise: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A self-hosted tool used to retain, analyze, and search an organization's log data<span style="background: white; mso-highlight: white;"> to provide security information and alerts in real-time</span></span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Spyware: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Malware that’s used to gather and sell information without consent</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">SQL (Structured Query Language):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A programming language used to create, interact with, and request information from a database</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">SQL injection: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An attack that executes unexpected queries on a database</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Stakeholder: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">An individual or group that has an interest in any decision or activity of an organization</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Standard error:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An error message returned by the OS through the shell</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Standard input:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Information received by the OS via the command line</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Standard output: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Information returned by the OS through the shell</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Standards:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> References that inform how to set policies</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">STAR method: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An interview technique used to answer behavioral and situational questions </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Stateful: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A class of firewall that keeps track of information passing through it and proactively filters out threats</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Stateless: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A class of firewall that operates based on predefined rules and that does not keep track of information from data packets</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Stored XSS attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An instance when malicious script is injected directly on the server</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">String concatenation: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of joining two strings together </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">String data:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Data consisting of an ordered sequence of characters</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Style guide:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A manual that informs the writing, formatting, and design of documents</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Subnetting: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The subdivision of a network into logical groups called subnets</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Substring: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A continuous sequence of characters within a string</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Sudo: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">A command that temporarily grants elevated permissions to specific users</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Supply-chain attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An attack that targets systems, applications, hardware, and/or software to locate a vulnerability where malware can be deployed</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Suricata</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">: An open-source intrusion detection system, intrusion prevention system, and network analysis tool</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Switch: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A device that makes connections between specific devices on a network by sending and receiving data between them</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Symmetric encryption: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The use of a single secret key to exchange information</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Synchronize (SYN) flood attack: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A type of DoS attack that simulates a TCP/IP connection and floods a server with SYN packets</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Syntax: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The rules that determine what is correctly structured in a computing language</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Syntax error:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> An error that involves invalid usage of a programming language</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">T</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Tailgating: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A social engineering tactic in which unauthorized people follow an authorized person into a restricted area</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">TCP/IP model: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A framework used to visualize how data is organized and transmitted across a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">tcpdump: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A command-line network protocol analyzer</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Technical skills:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Skills that require knowledge of specific tools, procedures, and policies </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Telemetry:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The collection and transmission of data for analysis</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Threat:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Any circumstance or event that can negatively impact assets</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Threat actor: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Any person or group who presents a security risk</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Threat hunting: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The proactive search for threats on a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Threat intelligence: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Evidence-based threat information that provides context about existing or emerging threats</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Threat modeling: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">The process of identifying assets, their vulnerabilities, and how each is exposed to threats</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Transferable skills:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Skills from other areas that can apply to different careers </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Transmission Control Protocol (</span><span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">TCP): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An internet communication protocol that allows two devices to form a connection and stream data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Triage</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: The prioritizing of incidents according to their level of importance or urgency</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Trojan horse: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Malware that looks like a legitimate file or program</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">True negative: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A state where there is no detection of malicious activity</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">True positive </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An alert that correctly detects the presence of an attack</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Tuple data:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Data that consists of a collection of data that cannot be changed</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Type error: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An error that results from using the wrong data type</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">U</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Ubuntu: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An open-source, user-friendly distribution that is widely used in security and other industries</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Unauthorized access: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An incident type that occurs when an individual gains digital or physical access to a system or application without permission </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Uncontrolled zone: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Any network outside your organization's control</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Unified Extensible Firmware Interface (UEFI): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A microchip that contains loading instructions for the computer and replaces BIOS on more modern systems</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">USB baiting:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> <span style="background: white; mso-highlight: white;">An attack in which a threat actor strategically leaves a malware USB stick for an employee to find </span>and install to unknowingly infect a network</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">User:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The person interacting with a computer </span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">User Datagram Protocol (UDP):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> <span style="background: white; mso-highlight: white;">A connectionless protocol that does not establish a connection between devices before transmissions</span></span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">User-defined function:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A function that programmers design for their specific needs</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">User interface:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A program that allows the user to control the functions of the operating system</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">User provisioning: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of creating and maintaining a user's digital identity</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">V</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Variable: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A container that stores data</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Virtual Private Network (VPN):</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A network security service that changes your public IP address and hides your virtual location so that you can keep your data private when you are using a public network like the internet</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Virus: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Malicious code written to interfere with computer operations and cause damage to data and software</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">VirusTotal:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> <span style="background: white; mso-highlight: white;">A service that allows anyone to analyze suspicious files, domains, URLs, and IP addresses for malicious content </span></span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Vishing:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> The exploitation of electronic voice communication to obtain sensitive information or to impersonate a known source</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Visual dashboard:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;"> A way of displaying various types of data quickly in one place</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Vulnerability:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A weakness that can be exploited by a threat</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Vulnerability assessment: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The internal review process of an organization's security systems</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Vulnerability management: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">The process of finding and patching vulnerabilities</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Vulnerability scanner: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; background: white; mso-highlight: white;">Software that automatically compares existing common vulnerabilities and exposures against the technologies on the network</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">W</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Watering hole attack</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">: A type of attack when a threat actor compromises a website frequently visited by a specific group of users</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Web-based exploits:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> Malicious code or behavior that’s used to take advantage of coding flaws in a web application</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Whaling: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A category of spear phishing attempts that are aimed at high-ranking executives in an organization</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Wide Area Network (WAN): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A network that spans a large geographic area like a city, state, or country</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Wi-Fi Protected Access (WPA): </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A wireless security protocol for devices to connect to the internet</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Wildcard: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">A special character that can be substituted with any other character</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Wireshark: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An open-source network protocol analyzer</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">World-writable file:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A file that can be altered by anyone in the world</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Worm: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Malware that can duplicate and spread itself across systems on its own</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">Y</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">YARA-L:</span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';"> A computer language used to create rules for searching through ingested log data</span>

<span lang="EN" style="font-size: 24.0pt; line-height: 115%; font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans'; color: #4285f4;">Z</span>

**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">Zero-day: </span>**<span lang="EN" style="font-family: 'Google Sans'; mso-fareast-font-family: 'Google Sans'; mso-bidi-font-family: 'Google Sans';">An exploit that was previously unknown</span>