Encryption 🔒

Encryption, also known as cryptography in everyday language although this term is inappropriate, is a technique which consists of transforming understandable data, known as plaintext data, into an unreadable and incomprehensible format, known as encrypted data, using mathematical algorithms and one or more encryption keys.

This transformation ensures that only people with the decryption key (or the corresponding keys in the case of two-key systems) can read and understand the original content.

The aim is to protect the confidentiality, integrity and sometimes authenticity of information, by preventing it from being consulted or modified by unauthorised persons.
The aim is to protect the confidentiality, integrity and sometimes authenticity of information, by preventing it from being consulted or modified by unauthorised persons.

CISA 🟩 Authority

CISA (Cybersecurity and Infrastructure Security Agency) is a US government agency attached to the Department of Homeland Security (DHS).

Created in 2018, its main mission is to protect the United States' critical infrastructures and strengthen national cybersecurity in the face of cyber and physical threats. 

Cookies

Cookies are small text files stored on a user's device when they visit a website.

They contain information about the user's preferences, browsing history and other data enabling the online experience to be personalised.

Cryptojacking (cryptographic hacking) 🔴 Attack

Cryptojacking, also known as cryptographic hacking, is an insidious and increasingly widespread form of cyberattack. It involves cybercriminals secretly exploiting the computer resources (CPU, GPU graphics card, RAM, bandwidth, and consequently electrical energy) of victims, without their consent or knowledge, to generate cryptocurrencies (such as Bitcoin, Monero, Ethereum, or other digital currencies).

CSP (Content Security Policy) 🟢 Protection

In cybersecurity, CSP (Content Security Policy) is a technique for improving website security.

This is a web security mechanism that allows website administrators to specify which content sources are allowed to be loaded by the browser. It aims to prevent a wide range of attacks, including cross-site scripting (XSS), data injection and malicious script execution.