Cyber Vocab Session 6

Pentesting Methods, Cryptomalware, DNS, PKI, Digital Signatures

Session 6

Welcome to the sixth session of the Cyber Vocab newsletter!

This is Ronan from Cyber Vocab.

Today’s read time: 92 seconds

Let’s get right to it! ⬇️

Study Session 📚

Here are the five terms you’ll need to master by next week!

1. Pentesting Methods (Category: General)

There are two main methods of penetration testing in cybersecurity for IT systems and applications.

Black Box Testing: Penetration testing where the tester DOESN’T know the internal workings of the system.

White Box Testing: Penetration testing where the tester DOES know the internal workings of the system.

2. Cryptomalware (Category: Common Vulnerabilities)

Cryptomalware is a type of ransomware attack where the attacker sends malicious software designed to encrypt a victim's files, rendering them inaccessible until a ransom is paid.

It often spreads through phishing emails, malicious attachments, or software vulnerabilities.

There's no guarantee that the attackers will provide the decryption key after payment.

3. Domain Name Systems / DNS (Category: General)

The Domain Name System (DNS) is a database that functions like a phone book that translates human-readable domain names (like "example.com") into numerical IP addresses that computers use to identify each other on the network.

When a user enters a web address in their browser, the DNS resolves this address to the corresponding IP address, enabling the browser to connect to the correct server.

DNS security is important to prevent attacks such as DNS poisoning, where attackers can rewrite DNS records to redirect clients to other websites.

4. Public Key Infrastructure / PKI (Category: General)

Public Key Infrastructure (PKI) is a framework used to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

The system relies on a pair of keys, a public key for encryption and a private key for decryption, ensuring secure communication and authentication over unsecured channels like the Internet.

This infrastructure is fundamental in enabling secure and trusted digital transactions, such as secure email, digital signatures, and authentication of websites and software.

5. Digital Signature (Category: General)

Digital signatures are a cryptographic tool used to ensure the authenticity and integrity of digital documents or messages.

They employ a combination of the user’s exchanged data that is hashed, a user's private key for signing a document, and a corresponding public key that others can use to verify the signature's validity.

Digital signatures are crucial in various online transactions and communications, providing a secure and legally recognized means to confirm the identity of the signatory and the document's unaltered status since signing.

Are you up for the challenge? 😈

Every week, you will be quizzed on whether you remembered the words from last week’s session.

Score well on the weekly quizzes and get placed on the scoreboard!

MCQ Quiz Length: 90 Seconds

Scoreboard 🏆

1. aliadansaidomar

2. sinhasoumyaditya.12345

3. eliteproducts702

Sponsors 🤝

This week’s session is sponsored by Square X.

Square X is a browser extension that allows you to do disposable browsing, secure file opening, and use temporary emails.

Start using Square X using this link

What I’m Doing

What I’m studying

I’m finishing up IBM’s DevOps Course. I highly recommend this course if you want to go into cloud engineering and cloud security.

What I’m working on

Currently working on building a FREE course teaching web app security.

Stay Tuned 👀

What I’m reading

I’m reading about the importance of the Payment Card Industry Data Security Standard (PCI DSS) in E-Commerce Security.

That’s it for this week! I’ll see you again! 👋

PS: If you haven’t followed me on all my other socials, do so below ⬇️