Skip to content

Commit

Permalink
update as of Wed Jan 10 09:34:28 AM CET 2024
Browse files Browse the repository at this point in the history
  • Loading branch information
asis2016 committed Jan 10, 2024
1 parent 2a774b3 commit e250346
Show file tree
Hide file tree
Showing 4 changed files with 13 additions and 3 deletions.
3 changes: 3 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -52,4 +52,7 @@ Contributions are always welcome! Please contact [email protected].
<li id="cg-ref-13">
“FreeBSD Manual Pages.” https://man.freebsd.org/cgi/man.cgi (accessed Jan. 10, 2024).
</li>
<li id="cg-ref-14">
“W3Schools Online Web Tutorials.” https://www.w3schools.com/ (accessed Jan. 10, 2024).
</li>
</ol>
3 changes: 2 additions & 1 deletion assets/dictionary/dictionary.csv
Original file line number Diff line number Diff line change
Expand Up @@ -13,5 +13,6 @@ Doppelganger domain,A “fake” domain name that looks similar to the real doma
Cryptography,“The science of making the cost of discovery of hidden information greater than the value of information itself”,3,
Zero-day start,"“Zero-day start” means when a new employee joins the company her systems, permissions, infrastructure resources, etc are setup and ready immediately",3,
Deprovisioning,"In digital identity, deprovisioing refers to act of removing identities from the system once the “user” is at the end of their digital identity lifecycle",3,
Content delivery network (CDN),"CDNs distribute content to cache servers located near end users, with the objective of providing fast, reliable, and high availability of the data",12,
Content Delivery Network (CDN),"CDNs distribute content to cache servers located near end users, with the objective of providing fast, reliable, and high availability of the data",12,
Traceroute,Traceroute is a network diagnostic command that print the route packets take to network host,13,
Structured Query Language (SQL),"It is a standard language for storing, manipulating and retrieving data in databases. Some examples include MySQL, SQL Server, Oracle, Postgres, etc",14,
2 changes: 1 addition & 1 deletion assets/dictionary/dictionary.en.minified.json
Original file line number Diff line number Diff line change
@@ -1 +1 @@
[{"Term":"Access Control List (ACL)","QuickSummary":" ACL is a list of rules that grants or denies users or systems for a particular resource","Ref":"","":""},{"Term":"Clickjacking","QuickSummary":"Click-hijacking","Ref":" tricking someone to click something for malicious purposes","":"11"},{"Term":"Content delivery network (CDN)","QuickSummary":"CDNs distribute content to cache servers located near end users, with the objective of providing fast, reliable, and high availability of the data","Ref":"12","":""},{"Term":"Cryptography","QuickSummary":"\u201cThe science of making the cost of discovery of hidden information greater than the value of information itself\u201d","Ref":"3","":""},{"Term":"Deprovisioning","QuickSummary":"In digital identity, deprovisioing refers to act of removing identities from the system once the \u201cuser\u201d is at the end of their digital identity lifecycle","Ref":"3","":""},{"Term":"Distributed Denial-of-Service (DDoS) Attack","QuickSummary":"The attack where attacker floods a server with lots of distributed traffic so that the service from the server is interrupted","Ref":"0","":""},{"Term":"Doppelganger domain","QuickSummary":"A \u201cfake\u201d domain name that looks similar to the real domain","Ref":" that serves a fake version of the real website","":"1"},{"Term":"Exploit","QuickSummary":"A piece of code that takes advantage of vulnerabilities or security flaws","Ref":"1","":""},{"Term":"Firewall","QuickSummary":"A software that continuously monitors and controls for incoming and outgoing traffic based on security rules","Ref":"1","":""},{"Term":"IDM","QuickSummary":"Identity and Access Management","Ref":"","":""},{"Term":"Kali Linux","QuickSummary":"Linux distribution designed for digital forensics and penetration testing preinstalled with more than 600 security and hacking tools","Ref":"1","":""},{"Term":"Likejacking","QuickSummary":"A type of clickjacking trick where someone is fooled into liking something on Facebook without knowing or agreeing to it","Ref":"1","":""},{"Term":"Metasploit","QuickSummary":"A software that provides information about security vulnerabilities and aids in penetration testing and IDS signature development","Ref":"","":""},{"Term":"Reverse Proxy","QuickSummary":"A type of proxy server that typically sits behind the firewall in a private network and directs client requests to the appropriate backend server","Ref":"2","":""},{"Term":"Traceroute","QuickSummary":"Traceroute is a network diagnostic command that print the route packets take to network host","Ref":"13","":""},{"Term":"Zero-day start","QuickSummary":"\u201cZero-day start\u201d means when a new employee joins the company her systems, permissions, infrastructure resources, etc are setup and ready immediately","Ref":"3","":""}]
[{"Term":"Access Control List (ACL)","QuickSummary":" ACL is a list of rules that grants or denies users or systems for a particular resource","Ref":"","":""},{"Term":"Clickjacking","QuickSummary":"Click-hijacking","Ref":" tricking someone to click something for malicious purposes","":"11"},{"Term":"Content Delivery Network (CDN)","QuickSummary":"CDNs distribute content to cache servers located near end users, with the objective of providing fast, reliable, and high availability of the data","Ref":"12","":""},{"Term":"Cryptography","QuickSummary":"\u201cThe science of making the cost of discovery of hidden information greater than the value of information itself\u201d","Ref":"3","":""},{"Term":"Deprovisioning","QuickSummary":"In digital identity, deprovisioing refers to act of removing identities from the system once the \u201cuser\u201d is at the end of their digital identity lifecycle","Ref":"3","":""},{"Term":"Distributed Denial-of-Service (DDoS) Attack","QuickSummary":"The attack where attacker floods a server with lots of distributed traffic so that the service from the server is interrupted","Ref":"0","":""},{"Term":"Doppelganger domain","QuickSummary":"A \u201cfake\u201d domain name that looks similar to the real domain","Ref":" that serves a fake version of the real website","":"1"},{"Term":"Exploit","QuickSummary":"A piece of code that takes advantage of vulnerabilities or security flaws","Ref":"1","":""},{"Term":"Firewall","QuickSummary":"A software that continuously monitors and controls for incoming and outgoing traffic based on security rules","Ref":"1","":""},{"Term":"IDM","QuickSummary":"Identity and Access Management","Ref":"","":""},{"Term":"Kali Linux","QuickSummary":"Linux distribution designed for digital forensics and penetration testing preinstalled with more than 600 security and hacking tools","Ref":"1","":""},{"Term":"Likejacking","QuickSummary":"A type of clickjacking trick where someone is fooled into liking something on Facebook without knowing or agreeing to it","Ref":"1","":""},{"Term":"Metasploit","QuickSummary":"A software that provides information about security vulnerabilities and aids in penetration testing and IDS signature development","Ref":"","":""},{"Term":"Reverse Proxy","QuickSummary":"A type of proxy server that typically sits behind the firewall in a private network and directs client requests to the appropriate backend server","Ref":"2","":""},{"Term":"Structured Query Language (SQL)","QuickSummary":"It is a standard language for storing, manipulating and retrieving data in databases. Some examples include MySQL, SQL Server, Oracle, Postgres, etc","Ref":"14","":""},{"Term":"Traceroute","QuickSummary":"Traceroute is a network diagnostic command that print the route packets take to network host","Ref":"13","":""},{"Term":"Zero-day start","QuickSummary":"\u201cZero-day start\u201d means when a new employee joins the company her systems, permissions, infrastructure resources, etc are setup and ready immediately","Ref":"3","":""}]
8 changes: 7 additions & 1 deletion assets/dictionary/dictionary.json
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@
"": "11"
},
{
"Term": "Content delivery network (CDN)",
"Term": "Content Delivery Network (CDN)",
"QuickSummary": "CDNs distribute content to cache servers located near end users, with the objective of providing fast, reliable, and high availability of the data",
"Ref": "12",
"": ""
Expand Down Expand Up @@ -83,6 +83,12 @@
"Ref": "2",
"": ""
},
{
"Term": "Structured Query Language (SQL)",
"QuickSummary": "It is a standard language for storing, manipulating and retrieving data in databases. Some examples include MySQL, SQL Server, Oracle, Postgres, etc",
"Ref": "14",
"": ""
},
{
"Term": "Traceroute",
"QuickSummary": "Traceroute is a network diagnostic command that print the route packets take to network host",
Expand Down

0 comments on commit e250346

Please sign in to comment.