Glossary

Some words, terms and phrases you might want to know more about.

1337

Elite, or leet.

Anonymity

Anonymity, adjective "anonymous", is derived from the Greek word ἀνωνυμία, anonymia, meaning "without a name" or "namelessness". An important example for anonymity being not only protected, but enforced by law is probably the vote in free elections. - wikipedia

Attribution

The blame game, a massive who done, where we try to find the pretetrator of the cyber attack.

Breach

In this context breach refers to a security breach. Where an intruder has managed to penetrate your security perimeter. There by gaining access to privileged information.

Cyber

Orginating from the word cybernetics. It has come to encompass everything relating to the internet and cyberspace.

Encryption

In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption does not of itself prevent interception, but denies the message content to the interceptor. - wikipedia

Entropy

...

Exploit

A piece of code to make use of a vulnerability.

Hacker

Person with emense intellect and skill. Making things work as well as creating new and fantastic projects that change the world.

HackSpace

A hackerspace (also referred to as a hacklab, makerspace or hackspace) is a community-operated workspace where people with common interests, often in computers, machining, technology, science, digital art or electronic art, can meet, socialize and collaborate. - wikipedia

NDA

Non-Disclosure Agreement, an agreement reached between parties to not divulge any private information of the other party.

Obfuscation

Hiding something.

OPSEC

Operations Security. The act of being proactively paranoid and hiding or minimizing the leakage of vital personal private information. Taking measure to dissemenate false information to mislead your adversary and gain the upper hand.

PenTest

PenTest also known as a penetration test.

Privacy

Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively. - wikipedia

Pwn, or pwned

Someone has been able to gain admin or root privileges on a machine and is now considered the new owner. They can do any number of things to the device.

Skiddie

Also known as a script kiddie. Individual lacking in ability who has to rely on others people code and tools.

Threat modeling

Mapping out the threats that are facing you and the liklihood of each. Then setting up appropriate responses.

UserGroup

A users' group (also user's group or user group) is a type of club focused on the use of a particular technology, usually (but not always) computer-related. - wikipedia

Vulnerability

A weakness in an application.