From bae23ddd378e6d063fd3b8020de1991050045037 Mon Sep 17 00:00:00 2001 From: Lion Date: Fri, 12 Jan 2024 19:09:34 +0100 Subject: [PATCH] update as of Fri Jan 12 07:09:34 PM CET 2024 --- assets/dictionary/dictionary.csv | 2 +- assets/dictionary/dictionary.en.minified.json | 2 +- assets/dictionary/dictionary.json | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/assets/dictionary/dictionary.csv b/assets/dictionary/dictionary.csv index 042df85..18ed55a 100644 --- a/assets/dictionary/dictionary.csv +++ b/assets/dictionary/dictionary.csv @@ -31,4 +31,4 @@ Application Programming Interface (API),API is a formal way to describe two diff Ransomeware as a Service (RaaS),A subscription-based cybercrime business model that enables affiliates to launch attacks without necessarily knowing the technical skills of the tools,0 Red Team,"“A red team is a group that pretends to be an enemy, attempts a physical or digital intrusion against an organization at the direction of that organization, then reports back so that the organization can improve their defenses”",25 Backdoor,A backdoor attack lets an attacker bypass normal security measures and access a computer system,26 -Airgap,A system that one no network connection at all,0 +Airgap,A system that has no network connection at all,0 diff --git a/assets/dictionary/dictionary.en.minified.json b/assets/dictionary/dictionary.en.minified.json index 974f207..ce3c72a 100644 --- a/assets/dictionary/dictionary.en.minified.json +++ b/assets/dictionary/dictionary.en.minified.json @@ -1 +1 @@ -{"result":[{"Term":"Access Control List (ACL)","QuickSummary":" ACL is a list of rules that grants or denies users or systems for a particular resource","Ref":"0"},{"Term":"Airgap","QuickSummary":"A system that one no network connection at all","Ref":"0"},{"Term":"Application Programming Interface (API)","QuickSummary":"API is a formal way to describe two different computers communicating directly with one another","Ref":"24"},{"Term":"Backdoor","QuickSummary":"A backdoor attack lets an attacker bypass normal security measures and access a computer system","Ref":"26"},{"Term":"Black hat","QuickSummary":"\"A computer hacker who violates laws or typical ethical standards for nefarious purposes, such as cybercrime, cyberwarfare or malice\u201d","Ref":"17"},{"Term":"Clickjacking","QuickSummary":"Tricking someone to click something for malicious purposes","Ref":"11"},{"Term":"Content Delivery Network (CDN)","QuickSummary":"CDNs distribute content to cache servers located near end users, with the objective of providing fast, reliable, and high availability of the data","Ref":"12"},{"Term":"Content Management System (CMS)","QuickSummary":"\u201cA content management system (CMS) is computer software used to manage the creation and modification of digital content\"","Ref":"16"},{"Term":"Cryptography","QuickSummary":"\u201cThe science of making the cost of discovery of hidden information greater than the value of information itself\u201d","Ref":"3"},{"Term":"Deprovisioning","QuickSummary":"In digital identity, deprovisioing refers to act of removing identities from the system once the \u201cuser\u201d is at the end of their digital identity lifecycle","Ref":"3"},{"Term":"Digital Certificate","QuickSummary":"It is an electronic document that proves the ownership of public encryption key. Aka public-key certificate","Ref":"1"},{"Term":"Distributed Denial-of-Service (DDoS) Attack","QuickSummary":"The attack where attacker floods a server with lots of distributed traffic so that the service from the server is interrupted","Ref":"0"},{"Term":"Doppelganger domain","QuickSummary":"A \u201cfake\u201d domain name that looks similar to the real domain that serves a fake version of the real website ","Ref":"1"},{"Term":"Exploit","QuickSummary":"A piece of code that takes advantage of vulnerabilities or security flaws","Ref":"1"},{"Term":"Firewall","QuickSummary":"A software that continuously monitors and controls for incoming and outgoing traffic based on security rules","Ref":"1"},{"Term":"Grey hat","QuickSummary":"\"A computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but usually does not have the malicious intent typical of a black hat hacker\u201d","Ref":"18"},{"Term":"Hypertext Transfer Protocol Secure (HTTPS)","QuickSummary":"An extension of HTTP that is used for secure communication","Ref":"20"},{"Term":"IDM","QuickSummary":"Identity management is the organizational process of making sure that the individuals have the appropriate access to digital resources","Ref":"27"},{"Term":"Kali Linux","QuickSummary":"Linux distribution designed for digital forensics and penetration testing preinstalled with more than 600 security and hacking tools","Ref":"1"},{"Term":"Likejacking","QuickSummary":"A type of clickjacking trick where someone is fooled into liking something on Facebook without knowing or agreeing to it","Ref":"1"},{"Term":"Metasploit","QuickSummary":"A software that provides information about security vulnerabilities and aids in penetration testing and IDS signature development","Ref":"0"},{"Term":"Port scanning","QuickSummary":"Port scanning is a technique or method that identifies open ports in a system. Once the scanning is completed, the attacker proceeds to carry out attacks and exploits on the system","Ref":"15"},{"Term":"Ransomeware as a Service (RaaS)","QuickSummary":"A subscription-based cybercrime business model that enables affiliates to launch attacks without necessarily knowing the technical skills of the tools","Ref":"0"},{"Term":"Red Team","QuickSummary":"\u201cA red team is a group that pretends to be an enemy, attempts a physical or digital intrusion against an organization at the direction of that organization, then reports back so that the organization can improve their defenses\u201d","Ref":"25"},{"Term":"Remote Code Execution (RCE)","QuickSummary":"RCE is where attacker executes malicious code on a target\u2019s computing device. Two of the well-known RCE attacks are the WannaCry ransomware exploit and the Log4j exploit","Ref":"23"},{"Term":"Remote Desktop Protocol (RDP)","QuickSummary":"RDP is a secure network communication protocol offered by Microsoft which allows users to perform remote operations on the another computer","Ref":"0"},{"Term":"Reverse Proxy","QuickSummary":"A type of proxy server that typically sits behind the firewall in a private network and directs client requests to the appropriate backend server","Ref":"2"},{"Term":"Structured Query Language (SQL)","QuickSummary":"It is a standard language for storing, manipulating and retrieving data in databases. Some examples include MySQL, SQL Server, Oracle, Postgres, etc","Ref":"14"},{"Term":"Traceroute","QuickSummary":"Traceroute is a network diagnostic command that print the route packets take to network host","Ref":"13"},{"Term":"Transport Layer Security (TLS)","QuickSummary":"\"TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery\u201d","Ref":"21"},{"Term":"Uniform Resource Identifier (URI)","QuickSummary":"\u201cA compact sequence of characters that identifies an abstract or physical resource.\u201d E.g. foo://example.com:8080/path/index.html?query=abc#tag ","Ref":"22"},{"Term":"White hat","QuickSummary":"\u201cAn ethical security hacker\u201d, under owner\u2019s constent, he/she helps to find vulnerabilities of the system","Ref":"19"},{"Term":"Zero-day start","QuickSummary":"\u201cZero-day start\u201d means when a new employee joins the company her systems, permissions, infrastructure resources, etc are setup and ready immediately","Ref":"3"}],"total":33} \ No newline at end of file +{"result":[{"Term":"Access Control List (ACL)","QuickSummary":" ACL is a list of rules that grants or denies users or systems for a particular resource","Ref":"0"},{"Term":"Airgap","QuickSummary":"A system that has no network connection at all","Ref":"0"},{"Term":"Application Programming Interface (API)","QuickSummary":"API is a formal way to describe two different computers communicating directly with one another","Ref":"24"},{"Term":"Backdoor","QuickSummary":"A backdoor attack lets an attacker bypass normal security measures and access a computer system","Ref":"26"},{"Term":"Black hat","QuickSummary":"\"A computer hacker who violates laws or typical ethical standards for nefarious purposes, such as cybercrime, cyberwarfare or malice\u201d","Ref":"17"},{"Term":"Clickjacking","QuickSummary":"Tricking someone to click something for malicious purposes","Ref":"11"},{"Term":"Content Delivery Network (CDN)","QuickSummary":"CDNs distribute content to cache servers located near end users, with the objective of providing fast, reliable, and high availability of the data","Ref":"12"},{"Term":"Content Management System (CMS)","QuickSummary":"\u201cA content management system (CMS) is computer software used to manage the creation and modification of digital content\"","Ref":"16"},{"Term":"Cryptography","QuickSummary":"\u201cThe science of making the cost of discovery of hidden information greater than the value of information itself\u201d","Ref":"3"},{"Term":"Deprovisioning","QuickSummary":"In digital identity, deprovisioing refers to act of removing identities from the system once the \u201cuser\u201d is at the end of their digital identity lifecycle","Ref":"3"},{"Term":"Digital Certificate","QuickSummary":"It is an electronic document that proves the ownership of public encryption key. Aka public-key certificate","Ref":"1"},{"Term":"Distributed Denial-of-Service (DDoS) Attack","QuickSummary":"The attack where attacker floods a server with lots of distributed traffic so that the service from the server is interrupted","Ref":"0"},{"Term":"Doppelganger domain","QuickSummary":"A \u201cfake\u201d domain name that looks similar to the real domain that serves a fake version of the real website ","Ref":"1"},{"Term":"Exploit","QuickSummary":"A piece of code that takes advantage of vulnerabilities or security flaws","Ref":"1"},{"Term":"Firewall","QuickSummary":"A software that continuously monitors and controls for incoming and outgoing traffic based on security rules","Ref":"1"},{"Term":"Grey hat","QuickSummary":"\"A computer hacker or computer security expert who may sometimes violate laws or typical ethical standards, but usually does not have the malicious intent typical of a black hat hacker\u201d","Ref":"18"},{"Term":"Hypertext Transfer Protocol Secure (HTTPS)","QuickSummary":"An extension of HTTP that is used for secure communication","Ref":"20"},{"Term":"IDM","QuickSummary":"Identity management is the organizational process of making sure that the individuals have the appropriate access to digital resources","Ref":"27"},{"Term":"Kali Linux","QuickSummary":"Linux distribution designed for digital forensics and penetration testing preinstalled with more than 600 security and hacking tools","Ref":"1"},{"Term":"Likejacking","QuickSummary":"A type of clickjacking trick where someone is fooled into liking something on Facebook without knowing or agreeing to it","Ref":"1"},{"Term":"Metasploit","QuickSummary":"A software that provides information about security vulnerabilities and aids in penetration testing and IDS signature development","Ref":"0"},{"Term":"Port scanning","QuickSummary":"Port scanning is a technique or method that identifies open ports in a system. Once the scanning is completed, the attacker proceeds to carry out attacks and exploits on the system","Ref":"15"},{"Term":"Ransomeware as a Service (RaaS)","QuickSummary":"A subscription-based cybercrime business model that enables affiliates to launch attacks without necessarily knowing the technical skills of the tools","Ref":"0"},{"Term":"Red Team","QuickSummary":"\u201cA red team is a group that pretends to be an enemy, attempts a physical or digital intrusion against an organization at the direction of that organization, then reports back so that the organization can improve their defenses\u201d","Ref":"25"},{"Term":"Remote Code Execution (RCE)","QuickSummary":"RCE is where attacker executes malicious code on a target\u2019s computing device. Two of the well-known RCE attacks are the WannaCry ransomware exploit and the Log4j exploit","Ref":"23"},{"Term":"Remote Desktop Protocol (RDP)","QuickSummary":"RDP is a secure network communication protocol offered by Microsoft which allows users to perform remote operations on the another computer","Ref":"0"},{"Term":"Reverse Proxy","QuickSummary":"A type of proxy server that typically sits behind the firewall in a private network and directs client requests to the appropriate backend server","Ref":"2"},{"Term":"Structured Query Language (SQL)","QuickSummary":"It is a standard language for storing, manipulating and retrieving data in databases. Some examples include MySQL, SQL Server, Oracle, Postgres, etc","Ref":"14"},{"Term":"Traceroute","QuickSummary":"Traceroute is a network diagnostic command that print the route packets take to network host","Ref":"13"},{"Term":"Transport Layer Security (TLS)","QuickSummary":"\"TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery\u201d","Ref":"21"},{"Term":"Uniform Resource Identifier (URI)","QuickSummary":"\u201cA compact sequence of characters that identifies an abstract or physical resource.\u201d E.g. foo://example.com:8080/path/index.html?query=abc#tag ","Ref":"22"},{"Term":"White hat","QuickSummary":"\u201cAn ethical security hacker\u201d, under owner\u2019s constent, he/she helps to find vulnerabilities of the system","Ref":"19"},{"Term":"Zero-day start","QuickSummary":"\u201cZero-day start\u201d means when a new employee joins the company her systems, permissions, infrastructure resources, etc are setup and ready immediately","Ref":"3"}],"total":33} \ No newline at end of file diff --git a/assets/dictionary/dictionary.json b/assets/dictionary/dictionary.json index fdab4b9..eb46c36 100644 --- a/assets/dictionary/dictionary.json +++ b/assets/dictionary/dictionary.json @@ -7,7 +7,7 @@ }, { "Term": "Airgap", - "QuickSummary": "A system that one no network connection at all", + "QuickSummary": "A system that has no network connection at all", "Ref": "0" }, {