top of page

Cyber Terminologies and Fundamentals

Definitions 

Web Application Firewall (WAF)

A security solution that filters and monitors HTTP traffic to protect web applications from attacks.

Wi-Fi Security

Measures to protect wireless networks from unauthorized access and attacks.

Watering Hole Attack

A cyberattack where attackers compromise a trusted website to target its visitors.

Wireless Intrusion Prevention System (WIPS)

A security system that detects and prevents unauthorized wireless network activity.

Whaling Attack

A phishing attack targeting high-profile individuals like executives or government officials.

Weak Password Exploits

Attacks that exploit weak or commonly used passwords to gain unauthorized access.

White-Box Cryptography

A cryptographic approach where encryption keys remain secure even when attackers have full access to the software.

Windows Defender Security Features

Security tools included in Windows Defender to protect against malware and cyber threats.

Web Cache Poisoning

An attack that manipulates cached web data to serve malicious content to users.

WebRTC Security Issues

Security risks associated with Web Real-Time Communication (WebRTC) technology.

Worms

Self-replicating malware that spreads across networks without user interaction.

Wireless Sniffing

Capturing and analyzing wireless network traffic to intercept sensitive information.

Website Defacement

An attack where hackers modify the visual appearance of a website, often for propaganda or vandalism.

Web Shells

Malicious scripts uploaded to web servers to provide remote access and control.

Windows Registry Forensics

Analyzing Windows registry data for forensic investigations and security assessments.

WebSocket Security Risks

Security concerns related to WebSocket communication, such as cross-site WebSocket hijacking.

WordPress Security Hardening

Techniques to improve the security of WordPress websites against hacking attempts.

Wireless Jamming

A type of attack that disrupts wireless communications by overwhelming frequencies with interference.

Windows Event Log Analysis

The process of reviewing Windows event logs to detect security incidents and anomalies.

Whitelist Bypass

Techniques used by attackers to circumvent security whitelists and execute malicious code.

bottom of page