Cyber security
R. Shirey Internet Security Glossary, GTE / BBN Technologies, May 2000
https://www.ietf.org/rfc/rfc2828.txt http://www.natcorp.ox.ac.uk/
http://www.oxforddictionaries.com/definition/english/cipher?q=cypher
http://niccs.us-cert.gov/glossary
№ |
Term |
Definition |
Usage |
|
|
Attack (n) |
an attempt to gain unauthorized access to system services, resources, or information, or to compromise system integrity |
violent/aggressive/active/passive/ inside/outside/spoofing ~; come under ~; syn. penetration, intrusion |
|
|
Authenticate (v)
|
prove or show sth to be true, genuine, or valid; confirm the correctness of the claimed identity
|
~ a document/identity/ authentication (n): certificate-based/biometric ~; authenticity (n); syn. verify, validate, confirm Cf. authorize |
|
|
Authorize (v) |
grant a right or a permission to a system entity to access a system resource |
~ sb to do sth; be ~ed to do sth; authorization (n): obtain/sign/present ~; authorized (adj): ~ payment/dealer; authority (n): have ~ over sth/sb; delegate ~ to sb; syn. entitle Cf. authenticate |
|
|
Back door (adj) |
a feature or defect of a computer system that allows secret unauthorized access to data |
leave a ~ to a computer; open a ~ to hackers; activate a ~; syn. trap door
|
|
|
Certify (v) |
officially recognize sb as possessing certain qualifications or meeting certain standards |
certificate (n): issue/renew/revoke/ grant/get/obtain a ~; ~ renewal/revocation; certified (adj): a ~ CISCO programmer/accountant/instructor; certification (n): ~ authority/procedure syn. accredit, qualify |
|
|
Cipher (n)
|
sth written in a code; a cryptographic algorithm
|
~ text/mode/key; write sth in ~; decipher (v), de/ciphered (adj): a ~ message syn. code, encrypt |
|
|
Classified (adj)
|
sth or sb arranged in categories according to shared qualities or characteristics; sth categorized as officially secret, access to which requires authorization |
~ document/information/ advertisement; be ~ according to into some categories; classify (v): ~ sb/sth into … according to…; classification (n): ~ level ant. declassified, unclassified |
|
|
Code (n) |
a system of symbols used to represent information in the form other than the original one |
write/crack a ~; ~ string/generator/ inspection/length/point; source/malicious/machine/ASCII ~; (de)encode (v) ; syn. cipher, cryptogram |
|
|
Compromise (v) |
cause to become vulnerable or function less effectively |
~ a system/data/security/one’s principles; ~ on sth; compromise (n): reach a ~; compromised (adj); syn. undermine, weaken, injure, harm |
|
|
Confidential (adj)
|
information to be disclosed only to those authorized to view it |
~ information/service/details/ performance check; keep sth ~; on a ~ basis; divulge ~ information; confidentiality (n): ~ agreement, breach of ~, total ~, under the terms of ~, guarantee/request ~; confidentially (adv); syn. private, personal, secret, sensitive, classified ant. open, public |
|
|
Corruption (n) |
dishonest or fraudulent conduct by those in power, typically involving bribery; degradation of a computer database or program by alteration or the introduction of errors |
expose/root out ~; allegation of ~; prevent accidental data ~; lead to/cause data ~; rotten with ~; corrupt/ed (adj); ant. integrity |
|
|
Dedicated (adj)
|
exclusively allocated to or intended for a particular purpose; a mode of operation of an IS, wherein all users are authorized to access all data handled by the system |
be ~ to a career/cause/team; a ~ channel/security mode/link/terminal/ web page/ graphics/card/employee /LAN /line; dedicate (v): ~ oneself to sth/sb; ~ sth to sb; dedication (n) syn: exclusive, allocated, assigned, customized |
|
|
Deny (v) |
refuse to give sth requested or desired to sb; refuse to admit the truth or existence of sth |
~ access/the existence of sth/evidence/a law/a privilege/a claim; ~ sb the right to sth; ~ oneself the pleasure of sth/doing sth; ~ that…; denial (n): ~ of service/access; (un)deniable (adj); syn: reject, dismiss, decline |
|
|
Encrypt (v) |
convert (information or data) into a code, especially to prevent unauthorized access |
~ information/data/a password/a message; encryption (n): ~ standards/code; ant. decrypt (v), cryptography (n), (un)encrypted (adj) |
|
|
Expire (v) |
(of a document, authorization, or agreement) come to the end of the period of validity |
license/contract/ term/authorization ~s on/ at …; expiry (n): ~ date; upon/before/after ~; expiration (n) |
|
|
Expose (v) |
make sth visible by uncovering it; release sensitive data to an unauthorized entity (as a result of theft, wiretapping, etc.), cause someone to be vulnerable or at risk |
~ sb to danger/risk/treatment/injury; ~ the nature/flaw/defect of sth; exposed (adj): ~ to culture/best practices; ~ and vulnerable; exposure (n): deliberate/unintentional ~; syn. endanger/imperil/jeopardize sb/sth; familiarize/acquaint sb with sth |
|
|
Detect (v) |
discover or identify the presence or existence of sth |
~ intrusion/a virus/an attempt/cancer /crime/ changes/trends; detector (n): fire ~; detective (n); syn. become aware/conscious of, perceive |
|
|
Digital (adj)
|
relating to, using, or storing data or information in the form of signals expressed as series of the digits 0 and 1 |
~ certificate/signal/age/map/assistant/ TV/generation/technology/revolution/ recording/cassette/copier/image; digitize (v); digit (n); ant. analogue |
|
|
Disrupt (v)
|
interrupt or prevent the correct operation of system services and functions
|
~ the workflow/operations/activities/ an application/mechanism/process/ system/production/plans; disruption (n), disruptive (adj); syn. discontinue, interfere |
|
|
Fail (v) |
be unsuccessful in achieving one’s goal; cease to work properly; break down |
~ in one’s attempt to do sth/to do sth/an exam; ~-safe mode/a ~ grade; ~ to qualify/to meet the standards; failure (n): ~ control; be doomed to ~; syn. breakdown, malfunction, go wrong; ant. succeed |
|
|
Filter (n) |
a piece of software that processes data before passing it to another application, for example to reformat characters or to remove unwanted types of material |
~ out/through sth; ~ a system/a message/traffic/ information /calls; filter (n): water/oil/software/ removable ~; install a ~; ~ capability syn. sift, purify |
|
|
Firewall (n) |
either a hardware program or a feature intended to filter incoming and outbound traffic |
install/construct/bypass a ~; monitor computers and networks through ~; invest in a software ~; up-to-date/outdated personal ~; voice ~; syn: security gateway |
|
|
Identity (n) |
the characteristics determining who or what a person or thing is |
~ card; personal/mistaken/group/corporate/ racial/social/ethnic ~; identify (v): ~ sb with sth/sb; identifier (n); identification (n); syn. selfhood |
|
|
Integrity (n)
|
the quality of being honest and having strong moral principles; the state of being undivided; internal consistency or lack of corruption in electronic data |
a man of ~; data ~; database ~ check; check sth for ~; structural/moral/territorial ~; ensure/preserve ~; integral (adj), integrated (adj); syn. soundness, solidity |
|
|
Intrude (v) |
enter with a disruptive or adverse effect; gain access to sensitive data without authorization by circumventing a system's security protection |
~ on sb’s privacy/into sb’s private life; intruder (n), intrusion (n): defend sth against ~; syn. encroach, infringe, invade, disrupt Cf: trespassing, penetration, reverse engineering
|
|
|
Log in/on (v)
|
gain access to a session to use system resources usually by providing a user name and password to an access control system |
~ to one’s computer/account/network; login (n): type the ~; a ~ command file; log (n): keep a ~; a logbook (n); ant. log off/out |
|
|
Password (n) |
a secret word or phrase used to gain admission to a place; a string of characters that allows access to a computer, interface, or system |
type/enter/change/require/supply/ know/forget the ~; ~ protection; be protected by a ~; a(n) (in)valid ~ |
|
|
Penetrate (v)
|
gain unauthorized access to sensitive data by circumventing a system's protections |
~ the market/into a system; penetration(n): high/deep ~; ~ level; im/penetrable (adj): ~ barrier/network; syn. infiltrate, invade, intrude on |
|
|
Privacy (n) |
the state of being free from public attention; the right of a person to determine the degree to which s/he will share information about him/herself with others |
loss/guarantee of ~; invade/protect ~; ~ concerns/issues/policy/setting; for ~ reasons/considerations/ protection; private (adj): ~ network syn: confidentiality ant. publicity |
|
|
Proprietary (adj)
|
sth owned by an individual or a company, which needs to be licensed from the owner before it can be used |
~ information/brand/rights/interests/ name /OS/database/software/ system/features; ant. open, public/generic brand |
|
|
Rely (v) |
depend on sb/sth with full trust or confidence |
~ on/upon sb/sth; (un)reliable (adj), (un)reliability (n); syn. be confident of; depend on, trust |
|
|
Risk (n)
|
exposure to danger, the possibility that something unpleasant or unwelcome will happen |
~-averse; ~ factor; pose a ~; run the ~ of; security ~; a ~ to safety; risky (adj), riskiness (n); syn. insecurity, venture
|
|
|
Safety (n)
|
the condition of being protected from or unlikely to cause danger, risk, or injury |
cyber/public ~ ; assure/jeopardize sb’s ~; ~ barriers/precautions; safe (adj): stay ~ on the Internet, ~ for sb/from sth; safely (adv); syn. security |
|
|
Scan (v) |
look quickly but not very thoroughly through sth; convert a document or picture into digital form; check manually or automatically for viruses and malware |
~ for/through/into the computer; ~ data/ information/library/the contents/pages/ headings; scan (n): a quick ~ of sth, make a digital ~ of sth; scanner (n): optical/ultrasound/colour/ desktop ~; buy/test/run the ~ |
|
|
Secret (n) |
not known or seen or not meant to be known or seen by others |
guard/keep/divulge a ~; open/state/commercial/military ~; meet in ~; secretive (adj): ~ about plans syn. cryptic, confidential, classified |
|
|
Secure (adj) |
protected against attack or other criminal activity |
~ connection/transaction; ~ against/from sth; security (n) : ~ policy/update/ environment/mechanism/service/ protocol/level; social/data/ensure/ compromise/undermine ~; ant. insecure, insecurity |
|
|
Sensitive (adj) |
quick to detect or respond to slight changes, signals, or influences; kept secret or with restrictions on disclosure to avoid endangering security |
~ to criticism/other people’s feelings/about sth; ~ information/issue/test/equipment/area; sense (n), sensitivity (n); ant. insensitive, insensitivity |
|
|
Threat (n)
|
a person or thing likely to cause damage or danger, a potential for violation of security, harm |
pose/constitute/cause/carry out/fulfill/face a ~; security/major/hidden ~; a ~ to public safety; under the ~ of sth; threaten (v), threatening (adj); syn. jeopardy |
|
|
Valid (adj) |
legally or officially acceptable or binding; in legal force |
~ contract/license/password/visa; (in)validity (n), (in)validate (v), (in)validation (n); syn. effective |
|
|
Vulnerability
|
a flaw or weakness in a system that could be exploited to violate the system's security policy |
degree of ~; exploit/identify/fix a ~ on a system; in/vulnerable (adj): ~ group/position/to criticism/attacks; emotionally/feel ~; ant. immune |
ACTIVITIES
Activity 1. Give synonyms:
1. authenticate |
|
2. authorize |
|
3. compromise |
|
4. deny |
|
5. endanger |
|
6. disrupt |
|
7. intrude |
|
Activity 2. Give antonyms:
1. encrypt |
|
2. code |
|
3. admit |
|
4. vulnerable |
|
5. confidential |
|
6. succeed |
|
7. cipher |
|
8. proprietary |
|
Activity 3. Word family. Fill in the missing words of the same root where possible:
Noun |
Verb |
Adjective |
Adverb |
|
confide |
|
|
|
|
|
undeniably |
validity |
|
|
|
|
|
safe |
|
|
detect |
|
|
|
|
digital |
|
penetration |
|
|
|
Activity 4. Give prepositions:
1. Come ___ attack
2. Not to be used ___ expiry
3. Exposure ___ sth
4. Be doomed ___ failure
5. Check sth ___ integrity
6. Intrude ___ sb’s privacy
7. ___ privacy reasons
8. Rely ___ sth
9. Scan sth ___ the computer
Activity 5. Complete the table with words that form strong partnerships with the target vocabulary units:
|
Verb |
Target vocabulary unit |
1 |
|
A certificate |
2 |
|
|
3 |
|
|
4 |
|
|
5 |
|
|
6 |
|
|
Verb |
Target vocabulary unit |
1 |
|
A firewall |
2 |
|
|
3 |
|
|
4 |
|
|
Target vocabulary unit |
Noun |
1 |
confidential |
|
2 |
|
|
3 |
|
|
4 |
|
|
5 |
|
|
Target vocabulary unit |
Noun |
1 |
Code |
|
2 |
|
|
3 |
|
|
4 |
|
|
5 |
|
|
Target vocabulary unit |
Noun |
1 |
dedicated |
|
2 |
|
|
3 |
|
|
4 |
|
|
5 |
|
|
6 |
|
|
7 |
|
|
8 |
|
|
Target vocabulary unit |
Noun |
1 |
deny |
|
2 |
|
|
3 |
|
|
4 |
|
|
5 |
|
|
6 |
|
|
7 |
|
Activity 6. Match the given terms with their definitions:
1. back door |
A. disclose confidential information |
2. divulge |
B. a feature or defect of a computer system that allows secret unauthorized access to data |
3. deny |
C. sth categorized as officially secret, access to which requires authorization |
4. classified |
D. internal consistency or lack of corruption in electronic data |
5. integrity |
E. refuse to admit the truth or existence of sth |
6. threat |
F. owned by an individual or a company, which needs to be licensed from the owner before it can be used |
7. proprietary |
G. a person or thing likely to cause damage or danger, |
Activity 7. State the type of logical relations between the following concepts:
Concepts |
Logical relationship |
1. Authorize-authenticate |
A. general and specific |
2. Firewall – security |
B. cause and effect |
3. Deny – admit |
C. contrast |
4. Scan – digitize |
D. method and purpose |
5. Character – password |
E. part and whole |
6. Gain access – log in |
F. equivalence |
7. Integrity – corruption |
Activity 8. Decode a famous saying about computer security and comment on it:
(http://puzzlemaker.discoveryeducation.com/code/BuildCryptogram.asp)
Activity 9. Say what/who can be… and how:
Secured |
|
Corrupted |
|
Certified |
|
Dedicated |
|
In/validated |
|
Activity 10. Say what the following is used/done for:
Authentification |
|
Authorization |
|
Encryption |
|
Back door |
|
Invalidation |
|
Coding |
|
Fail-safe mode |
|
Activity 11.Do a mini-research and enumerate the security measures a) on the part of the user b) on the part of a programmer. Evaluate their reliability.
Activity 12. Explain the difference between the following concepts using the Venn diagram below:
Disclosing – divulging information |
Certificate – license |
Confidential – classified information |
Password – login – pin code |
Data integrity – academic integrity |
Safety - security |
Activity 13. Analyze the reliability of a) passwords; b) firewalls c) licenses.
Activity 14. Write a story of mistaken identity.
Activity 15. Describe your personal computer vulnerabilities.
TEST
1 |
All of these are synonymous to the word “authenticate” EXCEPT FOR: a) verify b) authorize c) validate d) confirm |
2 |
What is the logical relationship between the concepts “firewall – security”: a) general and specific b) cause and effect c) method and purpose d) part and whole |
3 |
What is the logical relationship between the concepts “deny – admit”: a) general and specific b) contrast c) method and purpose d) part and whole |
4 |
What is the logical relationship between the concepts “gain access – log in”: a) general and specific b) cause and effect c) equivalence d) part and whole |
5 |
What is the logical relationship between the concepts “character – password”: a) general and specific b) contrast c) method and purpose d) part and whole |
6 |
Which of these is a correct antonym to the adjective “penetrable”: a) unpenetrable b) inpenetrable c) impenetrable d) non-penetrable |
7 |
All of these mean “cause to become vulnerable or function less effectively” EXCEPT FOR: a) compromise b) secure c) penetrate d) expose |
8 |
Mark the odd word: a) compromise b) corrupt c) disrupt d) detect |
9 |
Official recognition of sb as possessing certain qualifications or meeting certain standards is referred to as ___. a) authentification b) certification c) authorization d) verification |
10 |
Mark the odd word: a) cipher b) code c) encrypt d) decrypt |
11 |
Which of these is antonymous to “confidential”: a) sensitive b) public c) classified d) proprietary |
12 |
All of these collocate with the adjective “dedicated” EXCEPT FOR: a) network b) channel c) link d) line |
13 |
Choose the correct preposition: While studying abroad one gets exposed ___ the risks of cross-cultural misunderstanding. a) for b) to c) at d) by |
14 |
Hackers try to ___ firewalls. a) install b) construct c) bypass d) set up |
15 |
All of these are synonymous to the verb “expose” EXCEPT FOR: a) endanger b) imperil c) peril d) jeopardize |
16 |
The project is doomed ___ failure. a) for b) to c) – d) from |
17 |
One can deny all of these EXCEPT FOR: a) sb’s right to sth b) access b) a service c) some evidence d) an invitation |
18 |
When scanning images ___ the computer, you digitize them a) on b) in c) into d) to |
19 |
Information categorized as officially secret, access to which requires authorization, is referred to as ___. a) confidential b) classified c) sensitive d) encrypted |
20 |
Try not to intrude ___ people’s privacy in social networks. a) — b) on c) at d) into |
