Essential Vocabulary for Navigating the World of Cyber Security
#
3-Way Handshake
In the realm of network communications, the 3-way handshake is a cornerstone process to establish a reliable connection between two systems. The process initiates with Machine A sending a SYN (Synchronize) packet to Machine B. In response, Machine B reciprocates by sending a SYN ACK (Synchronize Acknowledge) packet back to Machine A. Finally, Machine A sends an ACK (Acknowledge) packet to Machine B, completing the three-step handshake. This interaction establishes a secure connection, opening the communication channels between the two machines.
128-bit Encryption
A level of cipher strength defined by a key that is 128 bits in length. In the world of data security, 128-bit encryption is considered robust and reliable, providing a significant layer of protection for data in transit or at rest. With this high level of encryption, it becomes computationally unfeasible for unauthorized parties to crack the code.
256-bit Encryption
When it comes to safeguarding sensitive data, 256-bit encryption stands as the industry standard. It uses a key that is 256 bits in length, making the encrypted data virtually impenetrable to brute force attacks. This type of encryption is widely used in securing credit card transactions, personal data, and corporate information.
2-Factor Authentication (2FA)
A security measure that requires two distinct forms of identification to access a system or data. Often, this involves something the user knows (like a password), and something the user has (like a hardware token or a mobile phone). This dual-factor approach significantly enhances security by ensuring that even if one factor is compromised, the attacker still cannot gain access.
2048-bit Encryption
Typically utilized in securing SSL and TLS connections, 2048-bit encryption is known for its heightened security level. It uses a key that is 2048 bits long, thereby exponentially increasing the number of potential combinations and making it an extremely reliable choice for data encryption. It's especially relevant for securing sensitive transactions and communications in sectors like finance and government.
802.11
This term refers to a set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6, 5, and 60 GHz frequency bands. Managed by the IEEE, the 802.11 standards are widely used for network communications in homes, businesses, and public areas. The most common standards are 802.11b, 802.11g, 802.11n, and 802.11ac.