Read Time:1 Minute, 36 Second
Public Key Infrastructure (PKI)
A framework for managing digital certificates and encryption keys.
- public key infrastructure
- X.509
- Root certificate
- public key certificate
- certificate authority
- CAcert.org
- electronic signature
- certificate policy
- Certificate Practice Statement
- certificate revocation list
- Online Certificate Status Protocol
Tools
Computerized utilities designed to study and analyze the security of IT facilities and/or break into them on an unauthorized and potentially criminal basis.[12]
- List of security assessment tools
- Kali
- Security Administrator Tool for Analyzing Networks
- Nessus (software)
- Vulnerability scanner
- Nessus Attack Scripting Language
- OpenVAS
- Yasca
- Metasploit project
- John the Ripper
- Smeg Virus Construction Kit
- Virus Creation Laboratory
- Exploit kit
Threats
Modes of potential attacks on IT facilities.[13]
- Cyberattack
- STRIDE (security)
- Vulnerability (computing)
- Common Vulnerabilities and Exposures
- Privilege escalation
- Social engineering (security)
- Malware
- Spyware
- Backdoor (computing)
- Computer virus
- Computer worm
- Macro virus
- Keystroke logging
- Trojan horse
- Hardware Trojan
- Eavesdropping
- Zombie
- Botnets
- Advanced persistent threat
- Man-in-the-middle attack
- Man-on-the-side attack
- Meet-in-the-middle attack
- Length extension attack
- Replay attack
- Pre-play attack
- Dictionary attack
- Biclique attack
- Denial-of-service attack
- Resource exhaustion attack
- Brute-force attack
- Watermarking attack
- Mangled packet
- Reverse connection
- Polymorphic code
- Password cracking
- Spoofing attack
- POODLE
Exploits
Violations of IT facilities.[14]
- Exploit (computer security)
- Timeline of computer viruses and worms
- Comparison of computer viruses
- Malware analysis
- XML denial-of-service attack
- Distributed denial-of-service attacks on root nameservers
- Linux malware
- Zero-day (computing)
- Virus hoax
- Pegasus
- Rogue security software
- List of rogue security software
- MS Antivirus (malware)
- AntiVirus Gold
- Spysheriff
- SpywareBot
- TheSpyBot
- ByteDefender
- Security Essentials 2010
- Email spam
- Phishing
- Tiny Banker Trojan
- Melissa (computer virus)
- Brain (computer virus)
- CIH (computer virus)
- ILOVEYOU
- Anna Kournikova (computer virus)
- Michelangelo (computer virus)
- Simile (computer virus)
- Stoned (computer virus)
- Acme (computer virus)
- AIDS (computer virus)
- AI (computer virus)
- Cascade (computer virus)
- Flame (computer virus)
- Abraxas (computer virus)
- 1260 (computer virus)
- SCA (computer virus)
- ReDoS
- SYN flood
- Billion laughs attack
- UDP flood attack
- Wi-Fi deauthentication attack
- Smurf attack
- Mydoom
- IP address spoofing
- Fork bomb
- WinNuke
Criminal activity
Violation of the law by means of breaking into and/or misusing IT facilities. Laws that attempt to prevent these crimes.[15]
- Computer misuse act
- Cyber-security regulation
- China Internet Security Law
- Computer Crime and Intellectual Property Section
- Cyber criminals
- Cybercrime
- Security hacker
- White hat (computer security)
- Black hat (computer security)
- Industrial espionage #Use of computers and the Internet
- Phreaking
- RDP shop
- Market for zero-day exploits
- 2600 magazine
- Phrack, Google search on “hacker magazine”
- Identity theft
- Identity fraud
- Cyberstalking
- Cyberbullying