SSL Secure Sockets Layer A security protocol that protects data transmitted over the internet by encrypting it. SSL is used to establish a secure connection between a user’s device and a website or server, preventing hackers from accessing or stealing sensitive information. Easter Egg Meant to delight the user when found – a hidden feature, message or joke in a computer program, website, or video game that can pose a security risk if not managed properly. The concealed nature of “easter eggs” means an agent – acting positively or negatively – had access to backdoors and this raises concerns around malicious code being dropped in too. Sandboxing A cybersecurity technique that involves running potentially dangerous code in an isolated environment to test and evaluate it. It’s a key component of advanced threat protection and is especially effective against zero-day threats, which are new threats that haven’t been seen before. SaaS Software-as-a-Service A cloud-based subscription model that delivers security solutions.
– jealous spouses, crazed stalkers and suspicious employers.
Spam Unwanted, unsolicited junk emails or texts, generally advertising something nobody wants, needs or likes. Not Shoulder of Pork and Ham. Both can be pretty distressing. HNDL Harvest Now, Decrypt Later A security strategy used by cybercriminals to collect large amounts of encrypted data today, anticipating quantum computing in the future will allow them to decrypt it later. Key Escrow A method of storing encryption keys or passwords with a trusted third party. It allows for access to encrypted data in emergencies or when required by law, without compromising the encryption system’s security. Pretty much like leaving a key with the estate agent. Packet Sniffing A technique that involves capturing and analysing data packets sent over a network. Used for good by network security administrators, and for bad by hackers stealing confidential information. Phishing Describes a number of different ways of luring us into sharing sensitive information or taking a particular action. Like in fishing, the victim takes the bait. And some derivatives: spear- phishing, which is targeted at a particular individual, and whaling, aimed at ‘big fish’ – those big-wigs and senior personnel at the top of the pile. Insider Threat A cybersecurity threat that occurs when an authorised user, such as an employee, contractor, or business partner, misuses their access to a system. Insider threats can be intentional or accidental, and can be more costly and dangerous than external threats.
Handy Hints to Keep You, and Others, Safe l Check the email address, which may be different to the display name l Don’t click on links that are unfamiliar to you l Do not open attachments that you were not expecting l Report it – to your boss, your service provider, your bank, your IT department l Keep Software and the operating systems on your devices up to date l Get Antivirus Software l Use different, strong passwords, change them frequently l Make use of additional tools for MFA – Multi Factor Authentication – such as fingerprints and biometrics
ucadvanced.com
47
Powered by FlippingBook