*Below I have defined some key vocabulary words contained within the infographic
1. Worm
A worm is a type of malicious software (malware) that replicates itself to spread across systems and networks without needing a host program or user interaction.
Key Feature: Unlike viruses, worms can operate independently and exploit vulnerabilities to propagate.
2. Zero-Day
A zero-day refers to a security vulnerability in software or hardware that is unknown to the vendor or public.
Key Feature: Attackers exploit it before a patch or fix is available, making it highly dangerous.
3. PLC (Programmable Logic Controller)
A PLC is an industrial computer used to automate processes in machinery, such as those in manufacturing or critical infrastructure.
Key Feature: It runs pre-programmed instructions to control equipment like pumps, motors, and centrifuges.
4. Centrifuge
A centrifuge is a device that spins at high speeds to separate substances of different densities, commonly used in laboratories and industrial processes.
Key Use in Natanz: Iran used centrifuges for uranium enrichment by separating isotopes of uranium gas.
5. Air-Gapped
An air-gapped system is a computer or network isolated from external networks (e.g., the internet) for security purposes.
Key Feature: Physical access (e.g., via USB) is required to breach the system.
6. Insider Threat
An insider threat refers to a risk posed by someone with legitimate access to an organization’s systems or facilities who uses their access maliciously or negligently.
Examples: Employees, contractors, or partners intentionally or accidentally compromising security.
7. Rootkit
A rootkit is a type of malware that provides unauthorized access to a system and hides its presence to avoid detection.
Key Feature: It operates at a deep level of the operating system, often in kernel mode.
8. Kernel Mode
Kernel mode is a high-privilege operational mode in an operating system where code has unrestricted access to system hardware and resources.
Key Feature: Malware in kernel mode can control the entire system, making it hard to detect or remove.
9. Device Drivers
Device drivers are software components that enable an operating system to communicate with hardware devices, such as printers, hard drives, or industrial equipment.
Example: A driver translates operating system commands into hardware-specific instructions.
10. Private Key Certificates
A private key certificate is a digital document used in public key cryptography to establish trust between entities.
Key Feature: It contains a private key (kept secret) and a corresponding public key for secure communication or code signing.
11. Nitro Zeus
Nitro Zeus was a U.S. cyber operation designed to disable Iran’s critical infrastructure (e.g., power grids, communication systems) in the event of escalating tensions.
Key Feature: It involved a large-scale contingency plan for non-kinetic (cyber) warfare.