Skip to main content

Glossary

A B C D E F H I K M O P R S T U V W X All

A DDoS (Distributed Denial of Service) attack is an attack that aims to overload an online service, website or server with a large number of simultaneous false requests. Attackers use multiple computers, often botnets, to flood the target, making it inaccessible to users.

 

A DoS (denial of service) is a cybersecurity attack in which an attacker intentionally floods the resources of a service or network to prevent access or access to the service by real users. DoS attacks are often designed to overload servers, networks or websites, resulting in their response time being slowed or even eliminated.

A dictionary attack is a password-cracking technique in which an attacker attempts to use commonly used passwords or words to hack into a user account. Attackers use a pre-compiled dictionary of words, phrases or lists of passwords to quickly and efficiently attempt to guess the password. This method is particularly effective when users use simple, common or dictionary words as passwords.

A digital identity is a set of electronic information that identifies a person in the online space. This can be, for example, a username or an email address as a means of identification, or a password, biometric identification, etc. as a means of authentication. 

A digital signature is a cryptographic method that ensures the authenticity and integrity of electronic documents. It is widely used to authenticate contracts, financial transactions and other legal documents, helping to reduce paper-based processes and increase the speed and security of online transactions.

DKIM (Domain Keys Identified Mail) is an e-mail authentication method that allows the recipient to verify that the e-mail is from the domain indicated. The sending server digitally signs the mail when it is sent, ensuring that the content of the email has not been altered en route and that it is from the sender. This helps reduce the risk of email spoofing and spam.

A domain name is a unique, easily remembered address used to access websites, such as "cert.hu" or "google.com". Users can connect to websites using domain names through the DNS system.

The DNS system is basically the internet's "phone book", a database in which domain names are assigned to IP addresses. It is a distributed system, i.e. there is not a single DNS database, but countless DNS servers around the world, which are in a hierarchical relationship and are able to communicate with each other. Its primary task is to translate a domain name that humans can understand into an IP address that network devices can understand, or vice versa (reverse DNS), so that a given resource can be found on the network.

A drive-by download is an attack where malicious software is automatically downloaded and installed on the user's computer without the user being aware of it. This usually occurs on compromised websites where attackers exploit browser vulnerabilities. To protect yourself, you should regularly update your browsers and security software and avoid untrusted websites.