Ever thought of starting your career in the security field??
Or let's say you want to attend a workshop or a conference or information security event, so I suggest that you go through the following list of basic words that will help you understand better so that during a meeting or workshop you don't get lost or blank.
You can also go through our first post “Guide to Cybersecurity” before proceeding with this article where we given a small introduction or insight into Cybersecurity.
It's a simple World Wide Web abbreviation, The Web. All users who use HTTP are linked to each other globally. The WWW is one of the network's many features.
It is based on technology as follows:
HTTP & HTTPS:
HTTP is the Hyper Text Transfer Protocol and HTTPS stands for HyperText TransferProtocol Secure which are merely application protocols that guide the network to determine how to show the documents to you. HTTPS sends data in an encrypted form, ensuring the data will not be sent in plain text. To view the files, such protocols require a web browser. HyperText is a text with a connection with a web address to another text or document. There are many other protocols, so if you are more interested, I'm sharing a small list of protocols here.
SSL is Secure Socket Layer, a cryptographic protocol that guarantees that data is transmitted to the destination server from a client without any data manipulation and remains integral. Check this link to know about SSL's work.
A kernel is a hardware-managed computer program that transmits the operation to be performed for the OS. Here you can find the directory for the Linux kernel as Linux is Open Source, you can find the code. Modifying a kernel correctly will add some new features to your operating system.
Linux is a Linus Torvalds-created operating system. He developed Linux from a kernel because you don't get anywhere with a kernel by itself. You need a shell, compilers, a library, etc. to get a working system.
Linux is an open source distribution under the licenses of GNUv2 and GPL.
A shell is a user interface used to communicate with your operating system. This needs to deal with different commands. There are many shell forms like Cshell, the shell of Bourne, and the shell of Korn. It is a part of the user's command center that operates on the user's input. It checks whether or not the command is true. If valid, the commands will be sent to another part of the process.
Also known as Linux Distro, Linux distributions are different Linux Os based on different DE(Desktop Environment) loaded with the Linux kernel developed by the program. Kali, SamuraiSTF, and Blackbuntu are among the Linux distros that measure penetration.
A vulnerability is a weakness in a web application, a network protocol, a cartography algorithm, a lock, or a safe.
It is called manipulation to take advantage of this weakness. Using that vulnerability is called Exploitation when breaking into the system or anything. It's not always important to exploit a vulnerability. Exploitation can be in any form, like any programming language or can be a video or step by step procedure. This is Exploit or generally called a POC(Procedure Of Conduct).
Activities performed after a device has been abused are called payload. A payload is again an application with exploit code so as soon as an exploit succeeds the payload takes the lead and begins its function like linking the system back to the attacker or running a virus or just hiring the credentials. The payload depends entirely on what the attacker wants to do.
It is a way of testing the security of a web application or network or device that validates and verifies the security mechanism that is applied on it.
This does not only include the above, but it is also necessary to make a detailed report.
CVE stands for "Common Vulnerabilities and Exposure," maintaining the list of documented vulnerability and maintaining it with a common ID that would help to identify the vulnerability.
The main objective is to standardize the names of the vulnerabilities that are publicly known.
So that’s for now. See you next time.
Technology dependency in Business are growing, so is the risk. We come across SOS situation every now and then due to Cyber Crime.
Infopercept SOS model is like vaccine which immunize against threat at various levels
H-1209, Titanium City Center,
Anand Nagar Road, Satellite Road,
Ahmedabad – 380 015