top of page

Cyber Terminologies and Fundamentals

Definitions 

Least Privilege Principle

A security concept restricting user access to only necessary resources to minimize risk.

Lateral Movement

A technique used by attackers to move within a network after gaining initial access.

Logic Bomb

Malicious code triggered by specific conditions to execute unauthorized actions.

Log Analysis

The process of examining log files to detect anomalies, threats, or performance issues.

Link Encryption

A security method encrypting data at the communication link level to protect transmissions.

Linux Security Modules (LSM)

A framework in the Linux kernel that enforces security policies.

Local File Inclusion (LFI)

A vulnerability allowing attackers to execute files on a server via manipulated input.

Log Injection

A cyberattack where malicious data is inserted into logs to mislead analysis or enable exploits.

Layered Security Architecture

A defense-in-depth approach using multiple security controls at different layers.

Load Balancer Security

Measures to protect load balancers from threats like DDoS attacks and misconfigurations.

Log4Shell Vulnerability

A critical flaw in Log4j allowing remote code execution on affected systems.

LockBit Ransomware

A ransomware strain that encrypts files and demands payment for decryption.

Lookup Table Attack

A password-cracking method using precomputed hash values for rapid decryption.

Log Correlation

The process of linking and analyzing logs from different sources to detect threats.

Least Authority Model

A security principle limiting a system component's permissions to essential functions.

Lightweight Cryptography

Cryptographic algorithms optimized for resource-constrained environments like IoT devices.

Log Tampering

The act of modifying log files to erase traces of malicious activity or bypass detection.

Live Forensics

The practice of analyzing a system’s volatile memory and processes without shutting it down.

LUKS Encryption

A disk encryption standard for Linux providing strong security and key management.

Lua Malware Scripts

Malicious scripts written in Lua, often used for automation and exploiting vulnerabilities.

bottom of page