White Hat
distributed denial of service
An attack that uses many computers to perform a DoS attack
Certified Information Systems Security Professional
At least five years of cumulative, paid, full-time work experience in two or more of the eight domains of the CISSP Common Body of Knowledge (CBK)
Offensive Security Certified Professional
The tester studies a virtual network and attempts to hack into it. At the end of attacking, the tester submits a detailed report on successful and failed attacks, and the vulnerabilities found.
Certificate authority
Trusted third party that generates and maintains user certificates, which hold their public key
denial of service
an attack on a network resource that prevents authorized users from accessing the system
Tor
an onion browser; popular in the cyber security community
Penetration testing
and evaluation of the security of a network or system by actively simulating an attack.,
HTTPS
hypertext transfer protocol over secure sockets layer
SSL
protocol to manage the security of the website by encrypting the data exchanged in that site
Digital certificate
used for being accepted by the trust model of the internet
Trust model
uses various third party entities to validate the validity/safety of websites
White hat
Ethical hacker or researcher.
Cyber security forensic analyst
Specialist who investigates cyber crimes