1/25
IB DP CS 2026 Case study's vocabulary
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No study sessions yet.
Buffer overflow attacks
An attack where too much data is sent to a program so it overwrites memory and may crash or run attacker code.
Cross-site scripting (X-SS)
A web attack where an attacker injects malicious script into a trusted website so it runs in a user’s browser.
Exploit development
The process of creating code or a method that takes advantage of a software weakness to gain access or control.
Hacker
Someone who uses technical skills to access or test systems; can be ethical (authorized) or unethical (unauthorized).
IP address
A unique number assigned to a device on a network that helps identify it and route data to it.
Malware
Software designed to harm a computer or network
Network mapping
Creating a diagram or list of devices and connections in a network to understand how it is structured.
Network scanning
Checking a network to find active devices
Network topology
The layout of a network—how devices are connected (for example star
Open-source intelligence (OSINT)
Information gathered from publicly available sources (websites
OS detection
Identifying what operating system a device is running (for example Windows
Password cracking tool
A program used to guess or recover passwords (for example by trying many combinations or using known password lists).
Penetration testing
An authorized security test where testers attempt to find and safely exploit weaknesses to improve security.
Port scanning
Checking which network ports on a device are open to learn what services might be running.
Pretexting
A social engineering method where an attacker invents a believable story to trick someone into sharing information or access.
Response plan
A documented set of steps an organization follows to handle a security incident (contain
Search engine dorking
Using advanced search terms to find sensitive information that may be accidentally exposed online.
Security posture assessment
An overall review of an organization’s security strengths and weaknesses
Social engineering attacks
Attacks that manipulate people into giving up information
SQL injection
A database attack where an attacker inserts harmful SQL commands into an input field to access or change data.
System forensics
Collecting and analyzing digital evidence after an incident to understand what happened and support reporting.
Testing
Checking a system to find bugs
Black box
Testing with no internal knowledge of the system; the tester behaves like an outsider.
Grey box
Testing with limited internal knowledge (some access or details) to focus and improve the test.
White box
Testing with full knowledge of the system (code
Vishing (voice phishing)
A scam where attackers use phone calls or voice messages to trick people into revealing sensitive information.