Learning from major cyber security incidents
Learning from major cyber security incidents

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

Free course

Learning from major cyber security incidents


Asymmetric cryptography
Also known as public key cryptography. A method that sidesteps the key distribution problem, as each user creates their own keys: • the private key, which they keep safe and never distribute • the public key, which can be sent to anyone with whom they want to exchange encrypted information.
A digital currency that is mainly used online. However, it can be bought or sold with real money at bitcoin exchanges.
A network created by malware that allows an attacker to control a group of computers and use them to gather personal information or launch attacks against others, such as sending spam emails or flooding a website with so many requests for content that the server cannot cope.
A mathematical algorithm that turns plaintext into ciphertext and reverts ciphertext to plaintext.
Information that is encrypted such that it cannot be directly read by humans or a machine.
An action you take to protect your information against threats and vulnerabilities.
The process of reverting ciphertext to plaintext.
Distributed denial of service (DDoS)
A type of attack that floods computer servers with a massive amount of traffic coming from many different computers or computing devices. A DDoS attack can render a server unable to provide services to their legitimate users.
Domain Name System
The system that translates alphabetic internet domain and host names, such as the website addresses you enter into web browsers, into numeric IP addresses. Without this translation, the website names would not be converted to computer-readable numeric IP addresses and hence the web browser would not be able to connect to the website you want to go to.
The process of converting plaintext to ciphertext.
A hacking tool that exploits a defect in Microsoft’s implementation of the Server Message Block protocol, discovered in March 2017.
In a computer network, a firewall is a barrier that blocks dangerous communications from spreading across a network, either from the outside world into a local network, or from one part of a local network to another.
Intrusion detection system
An intrusion detection system is used to monitor data passing over a network or a computer in order to detect intrusion.
In the context of cryptography, a secret that is used to encrypt or decrypt messages.
Malware that attacks and takes over unsecured consumer devices and uses them to launch distributed denial-of-service attacks on websites.
Information that can be directly read by humans or a machine.
Programmable logic controllers
Very commonly used programmable controllers, which are often used to control industrial motors.
Malware that demands payment in order to refrain from doing some harmful action or to undo the effects of the harmful action.
Relational database
A very commonly used database type. This type of database organises data in tables and links the tables using indexes.
A small piece of computer program that aims to automate a process.
Secure Shell
A network protocol for providing a remote terminal. SSH is more secure than Telnet because it uses encryption to protect the transmission of the data.
Server Message Block
A protocol that allows applications on a computer to access files and services on other computers in a network.
Structured Query Language injection
A hacking technique for gaining unauthorised access to databases through ill-designed web pages.
Malware specifically designed to target programmable logic controllers. It was believed that the malware was designed by the US and Israeli security agencies to sabotage Iran’s uranium enrichment plant, in an effort to stop or delay its nuclear programme.
Malware that records the activities of the user, such as the passwords they type into the computer, and transmits this information to the person who wrote the malware.
Symmetric cryptography
A cryptography method in which both the encryption and decryption processes take place based on a common key. As a result, it is important to keep the key secret.
Teletype Network
A network protocol for providing a remote terminal to control a computer system.
Some danger that can exploit a vulnerability.
A Trojan is malware disguised as something useful and can be self-replicating.
A virus inserts a copy of itself into applications or crucial parts of the operating system in order to infect other computing devices or storage media that interact with the infected computer.
A point at which there is potential for a security breach.
Fast-spreading malware that surfaced in May 2017. When it infects a computer, it ‘locks’ the data files (rendering them unusable) and demands a ransom.
A worm exploits the vulnerability of computing devices in a network and replicates itself by finding and infecting other vulnerable computing devices.

Take your learning further

Making the decision to study can be a big step, which is why you'll want a trusted University. The Open University has 50 years’ experience delivering flexible learning and 170,000 students are studying with us right now. Take a look at all Open University courses.

If you are new to University-level study, we offer two introductory routes to our qualifications. You could either choose to start with an Access module, or a module which allows you to count your previous learning towards an Open University qualification. Read our guide on Where to take your learning next for more information.

Not ready for formal University study? Then browse over 1000 free courses on OpenLearn and sign up to our newsletter to hear about new free courses as they are released.

Every year, thousands of students decide to study with The Open University. With over 120 qualifications, we’ve got the right course for you.

Request an Open University prospectus371