glossary:start
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
glossary:start [2016/09/07 12:58] – peter | glossary:start [2023/07/17 15:57] (current) – peter | ||
---|---|---|---|
Line 2: | Line 2: | ||
- | ^ Item ^ Description ^ | + | ^Item^Description^ |
- | | 3DES (Triple Digital Encryption Standard) | In cryptography, | + | |3DES|Triple Digital Encryption Standard.| |
- | | 3G | 3G refers to the third generation of cellular data standards. | + | |:::|In cryptography, |
- | | 3-Way Handshake | Machine A sends a packet with a SYN flag set to Machine B. B acknowledges A's SYN with a SYN/ACK. A acknowledges B's SYN/ACK with an ACK.| | + | |3G|3G refers to the third generation of cellular data standards.| |
- | | 4G | 4G is the fourth generation of cellular data standards. | + | |:::|Cell phone companies often market mobile phones as "3G devices," |
- | | 802.11b | 802.11b is a Wi-Fi standard developed by the IEEE for transmitting data over a wireless network. | + | |3-Way Handshake|Machine A sends a packet with a SYN flag set to Machine B. B acknowledges A's SYN with a SYN/ACK. A acknowledges B's SYN/ACK with an ACK.| |
- | | 802.11g | 802.11g is a Wi-Fi standard developed by the IEEE for transmitting data over a wireless network. | + | |4G|4G is the fourth generation of cellular data standards. |
- | | AAA | Authentication, | + | |802.11b|802.11b is a Wi-Fi standard developed by the IEEE for transmitting data over a wireless network. |
- | | ACK PIGGYBACKING | + | |802.11g|802.11g is a Wi-Fi standard developed by the IEEE for transmitting data over a wireless network. |
- | | ACL (Access Control List) | A list of permissions attached to an object.| | + | |AAA|Authentication, |
- | | Access Control | Access Control ensures that resources are only granted to those users who are entitled to them.| | + | |AAC|Application Asset Controls, |
- | | Access Control List (ACL) | A list of permissions attached to an object.| | + | |AAR|Authorized Asset Repository. |
- | | Access Control Service | A security service that provides protection of system resources against unauthorized access. | + | |ABC|Anti-Bribary and Corruption.| |
- | | Access Matrix | An Access Matrix uses rows to represent subjects and columns to represent objects with privileges listed in each cell.| | + | |ACA|Application Criticality Assessment.| |
- | | Account Harvesting | The process of collecting all the legitimate account names on a system.| | + | |ACKPIGGYBACKING|The practice of sending an ACK inside another packet going to the same destination.| |
- | | Active Content | Program code embedded in the contents of a web page. When the page is accessed by a web browser, the embedded code is automatically downloaded and executed on the user's workstation. Ex. Java, ActiveX (MS).| | + | |ACL|Access Control List. |
- | | Active Directory | + | |Access Control|Access Control ensures that resources are only granted to those users who are entitled to them.| |
- | | Activity Monitors | Aim to prevent virus infection by monitoring for malicious activity on a system, and blocking that activity when possible.| | + | |Access Control List|ACL.| |
- | | AD (Active Directory) | A directory service implemented by Microsoft for Windows domain networks. | | + | |:::|A list of permissions attached to an object.| |
- | | Address Resolution Protocol | + | |Access Control Service|A security service that provides protection of system resources against unauthorized access. |
- | | ADSL (Asymmetric Digital Subscriber Line) | Asymmetric Digital Subscriber Line (ADSL) is a technology for transmitting digital information at high bandwidth on existing phone lines to homes and businesses. | + | |Access Matrix|An Access Matrix uses rows to represent subjects and columns to represent objects with privileges listed in each cell.| |
- | | Advanced Encryption Standard | + | |Account Harvesting|The process of collecting all the legitimate account names on a system.| |
- | | AES (Advanced Encryption Standard) | An encryption standard being developed by NIST. Intended to specify an unclassified, | + | |Active Content|Program code embedded in the contents of a web page. When the page is accessed by a web browser, the embedded code is automatically downloaded and executed on the user's workstation. Ex. Java, ActiveX (MS).| |
- | | Algorithm | A finite set of step-by-step instructions for a problem-solving or computation procedure, especially one that can be implemented by a computer.| | + | |Active Directory|AD.| |
- | | AML (Anti-Money Laundering) | + | |:::|A directory service implemented by Microsoft for Windows domain networks. | |
- | | Applet | An applet is any small application that performs one specific task, sometimes running within the context of a larger program, perhaps as a plug-in. | + | |Activity Monitors|Aim to prevent virus infection by monitoring for malicious activity on a system, and blocking that activity when possible.| |
- | | ARP (Address Resolution Protocol) | A protocol for mapping an Internet Protocol address to a physical machine address that is recognized in the local network. | + | |AD|Active Directory. |
- | | ARPANET | Advanced Research Projects Agency Network. | + | |ADAL| Authoritive Data Access Layer.| |
- | | ASN (Autonomous System Number) | A globally unique number assigned by a registrar for the purposes of Internet routing, | | + | |Address Resolution Protocol|ARP.| |
- | | Asymmetric Cryptography | Public-key cryptography. | + | |:::|A protocol for mapping an Internet Protocol address to a physical machine address that is recognized in the local network. |
- | | Asymmetric Warfare | Asymmetric warfare is the application of dissimilar strategies, tactics, capabilities and approaches used to circumvent or negate an opponent' | + | |ADS|Authoritive Data Source.| |
- | | Auditing | The information gathering and analysis of assets to ensure such things as policy compliance and security from vulnerabilities.| | + | |ADSL|Asymmetric Digital Subscriber Line (ADSL) is a technology for transmitting digital information at high bandwidth on existing phone lines to homes and businesses. |
- | | Asymmetric Digital Subscriber Line (ADSL) | Asymmetric Digital Subscriber Line (ADSL) is a technology for transmitting digital information at high bandwidth on existing phone lines to homes and businesses. | + | |Advanced Encryption Standard|AES.| |
- | | Asynchronous Transfer Mode (ATM) | Asynchronous Transfer Mode (ATM) is a broadband technology that permits large volumes of voice, image, text, or video data to be transmitted simultaneously. | + | |:::|An encryption standard being developed by NIST. Intended to specify an unclassified, |
- | | ATM (Asynchronous Transfer Mode) | Asynchronous Transfer Mode (ATM) is a broadband technology that permits large volumes of voice, image, text, or video data to be transmitted simultaneously. | + | |AEOD|After End-of-Day.| |
- | | Authentication | The process of confirming the correctness of the claimed identity.| | + | |AES|Advanced Encryption Standard. |
- | | Authorization | The approval, permission, or empowerment for someone or something to do something.| | + | |AIRB|Advanced Internal Rating Based Approach.| |
- | | Autonomous System | One network or series of networks that are all under one administrative control. | + | |A& |
- | | Autonomous System Number | + | |Algorithm|A finite set of step-by-step instructions for a problem-solving or computation procedure, especially one that can be implemented by a computer.| |
- | | Availability | The need to ensure that the business purpose of the system can be met and that it is accessible to those who need to use it.| | + | |AML|Anti money laundering (AML) is a term mainly used in the financial and legal industries to describe the legal controls that require financial institutions and other regulated entities to prevent or report money laundering activities.| |
- | | Backdoor | A backdoor is a tool installed after a compromise to give an attacker easier access to the compromised system around any security mechanisms that are in place.| | + | |AMSC|Application Management Service Centre.| |
- | | Bandwidth | Commonly used to mean the capacity of a communication channel to pass data through the channel in a given amount of time. Usually expressed in bits per second.| | + | |aPass|Application Platform as a Service. |
- | | Banner | A banner is the information that is displayed to a remote user trying to connect to a service. | + | |Applet| An applet is any small application that performs one specific task, sometimes running within the context of a larger program, perhaps as a plug-in. |
- | | Basic Authentication | Basic Authentication is the simplest web-based authentication scheme that works by sending the username and password with each request.| | + | |AQM|Active Queue Management.| |
- | | Bastion Host | A bastion host has been hardened in anticipation of vulnerabilities that have not been discovered yet.| | + | |ARM|Approved Reporting Mechanism.| |
- | | BBS (Bulletin Board System) | A Bulletin Board System (BBS) is a computerized meeting and announcement system that allows people to carry on discussions, | + | |ARP|Address Resolution Protocol. |
- | | BCM (Business Continuity Management) | The management of a Business Continuity Plan (BCP).| | + | |ARPANET|Advanced Research Projects Agency Network. |
- | | BCP (Business Continuity Plan) | A Business Continuity Plan is the plan for emergency response, backup operations, and post-disaster recovery steps that will ensure the availability of critical resources and facilitate the continuity of operations in an emergency situation.| | + | |ASCII|American Standard Code for Information Interchange.| |
- | | Berkeley Internet Name Domain | + | |ASN|Autonomous System Number.| |
- | | BGP (Border Gateway Protocol) | An inter-autonomous system routing protocol. | + | |:::|A globally unique number assigned by a registrar for the purposes of Internet routing, | |
- | | BIA (Business Impact Analysis) | A Business Impact Analysis determines what levels of impact to a system are tolerable.| | + | |Asymmetric Cryptography|Public-key cryptography. |
- | | BIND (Berkeley Internet Name Domain) | BIND is an implementation of DNS. DNS is used for domain name to IP address resolution. | + | |Asymmetric Warfare|Asymmetric warfare is the application of dissimilar strategies, tactics, capabilities and approaches used to circumvent or negate an opponent' |
- | | Biometrics | Biometrics use physical characteristics of the users to identify the user.| | + | |Auditing|The information gathering and analysis of assets to ensure such things as policy compliance and security from vulnerabilities.| |
- | | Bit | The smallest unit of information storage; a contraction of the term " | + | |Asymmetric Digital Subscriber Line|ADSL.| |
- | | Block Cipher | A block cipher encrypts one block of data at a time.| | + | |:::|Asymmetric Digital Subscriber Line (ADSL) is a technology for transmitting digital information at high bandwidth on existing phone lines to homes and businesses. |
- | | Blog | Blog is a direct means for an individual to share ideas, thoughts, opinions, and information concerning a particular topic with an audience, using the Web as the medium. | + | |Asynchronous Transfer Mode|Asynchronous Transfer Mode (ATM) is a broadband technology that permits large volumes of voice, image, text, or video data to be transmitted simultaneously. |
- | | Border Gateway Protocol | + | |ATM|Asynchronous Transfer Mode (ATM) is a broadband technology that permits large volumes of voice, image, text, or video data to be transmitted simultaneously. |
- | | Boot Record Infector | A boot record infector is a piece of malware that inserts malicious code into the boot sector of a disk.| | + | |ATP|Accelerated Training Program.| |
- | | Bot | Also called ‘Internet bots’; refers to computers that perform tasks without human input. | + | |AUA|Assets Under Administration.| |
- | | Botnet | A botnet is a large number of compromised computers that are used to create and send spam or viruses or flood a network with messages as a denial of service attack.| | + | |AUM|Assets Under Management.| |
- | | Bridge | A mechanism (software or hardware) which connect two communication segments. Bridges generally operate at OSI Layer 2 or 3, but may operate from the physical layer up to the application layer. | + | |Authentication|The process of confirming the correctness of the claimed identity.| |
- | | Broadcast | To send the same message to an unknown number of destinations without addressing. Examples: ARP, Radio. See also multicast.| | + | |Authorization|The approval, permission, or empowerment for someone or something to do something.| |
- | | Broadcast Address | An address used to broadcast a datagram to all hosts on a given network using UDP or ICMP protocol.| | + | |Autonomous System|One network or series of networks that are all under one administrative control. |
- | | Browser | A client computer program that can retrieve and display information from servers on the World Wide Web.| | + | |Autonomous System Number|ASN.| |
- | | Brute Force | A crypto-analysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, | + | |:::|A globally unique number assigned by a registrar for the purposes of Internet routing.| |
- | | BSS 7799 | British Standard 7799. A standard code of practice and provides guidance on how to secure an information system. | + | |Availability|The need to ensure that the business purpose of the system can be met and that it is accessible to those who need to use it.| |
- | | Buffer Overflow | A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting or overwriting the valid data held in them.| | + | |Backdoor|A backdoor is a tool installed after a compromise to give an attacker easier access to the compromised system around any security mechanisms that are in place.| |
- | | Bullet-proof hosting | Bullet-proof hosting is a service provided by some domain hosting or web hosting firms that allow their customer considerable leniency in the kinds of material they may upload and distribute. | + | |Bandwidth|Commonly used to mean the capacity of a communication channel to pass data through the channel in a given amount of time. Usually expressed in bits per second.| |
- | | Bulletin Board System | + | |Banner|A banner is the information that is displayed to a remote user trying to connect to a service. |
- | | Business Continuity Management | + | |BAP|Business and Personal.| |
- | | Business Continuity Plan (BCP) | A Business Continuity Plan is the plan for emergency response, backup operations, and post-disaster recovery steps that will ensure the availability of critical resources and facilitate the continuity of operations in an emergency situation.| | + | |Basic Authentication|Basic Authentication is the simplest web-based authentication scheme that works by sending the username and password with each request.| |
- | | Business Impact Analysis | + | |Bastion Host|A bastion host has been hardened in anticipation of vulnerabilities that have not been discovered yet.| |
- | | Business Intelligence | Business intelligence is now widely accepted as being concerned with information technology solutions for transforming the output from large data collections into Intelligence; | + | |BAU|Business as Usual.| |
- | | Byte | A fundamental unit of computer storage; the smallest addressable unit in a computer' | + | |BBS|Bulletin Board System.| |
- | | CAC (Call Admission Control) | The inspection and control all inbound and outbound voice network activity by a voice firewall based on user-defined policies.| | + | |:::|A Bulletin Board System (BBS) is a computerized meeting and announcement system that allows people to carry on discussions, |
- | | Cache | Pronounced cash, a special high-speed storage mechanism. | + | |BCM|Business Continuity Management. The management of a Business Continuity Plan (BCP).| |
- | | Cache Cramming | Cache Cramming is the technique of tricking a browser to run cached Java code from the local disk, instead of the internet zone, so it runs with less restrictive permissions.| | + | |BCP|Business Continuity Plan. A Business Continuity Plan is the plan for emergency response, backup operations, and post-disaster recovery steps that will ensure the availability of critical resources and facilitate the continuity of operations in an emergency situation.| |
- | | Cache Poisoning | Malicious or misleading data from a remote name server is saved [cached] by another name server. | + | |BDC|Business Delivery and Control.| |
- | | Call Admission Control | + | |BEOD|Before End-of-Day.| |
- | | Carding | Carding is a term used for a process to verify the validity of stolen card data. The thief presents the card information on a website that has real-time transaction processing. | + | |Berkeley Internet Name Domain|BIND is an implementation of DNS. DNS is used for domain name to IP address resolution. |
- | | Cash-out | The aspect of a cybercrime operation where stolen electronic funds are finally withdrawn from the finance system in the form of hard cash, often perpetrated by the use of ‘money mules’.| | + | |BIOS|Basic Input Output System. |
- | | Cell | A cell is a unit of data transmitted over an ATM network. A cell is also a single physical memory location within flash memory.| | + | |BGP|Border Gateway Protocol. An inter-autonomous system routing protocol. |
- | | CERT (Computer Emergency Response Team) | An organization that studies computer and network INFOSEC in order to provide incident response services to victims of attacks, publish alerts concerning vulnerabilities and threats, and offer other information to help improve computer and network security.| | + | |BIA|Business Impact Analysis.| |
- | | Certificate-based Authentication | Certificate-Based Authentication is the use of SSL and certificates to authenticate and encrypt HTTP traffic.| | + | |:::|A Business Impact Analysis determines what levels of impact to a system are tolerable.| |
- | | CGI (Common Gateway Interface) | This mechanism is used by HTTP servers (web servers) to pass parameters to executable scripts in order to generate responses dynamically.| | + | |BIND|Berkeley Internet Name Domain.| |
- | | Chain of Custody | Chain of Custody is the important application of the Federal rules of evidence and its handling.| | + | |:::|BIND is an implementation of DNS. DNS is used for domain name to IP address resolution. |
- | | Challenge Handshake Authentication Protocol | + | |Biometrics|Biometrics use physical characteristics of the users to identify the user.| |
- | | CHAP (Challenge Handshake Authentication Protocol) | The Challenge-Handshake Authentication Protocol uses a challenge/ | + | |Bit|The smallest unit of information storage; a contraction of the term " |
- | | Chatroom | The name for a discussion group or chat room.| | + | |Block Cipher|A block cipher encrypts one block of data at a time.| |
- | | Checksum | A value that is computed by a function that is dependent on the contents of a data object and is stored or transmitted together with the object, for the purpose of detecting changes in the data.| | + | |Blog|Blog is a direct means for an individual to share ideas, thoughts, opinions, and information concerning a particular topic with an audience, using the Web as the medium. |
- | | Cipher | A cryptographic algorithm for encryption and decryption.| | + | |BLoR|Business List of Records. |
- | | Ciphertext | Ciphertext is the encrypted form of the message being sent.| | + | |BOM|Business Only Membership.| |
- | | Circuit Switched Network | A circuit switched network is where a single continuous physical circuit connected two endpoints where the route was immutable once set up.| | + | |Border Gateway Protocol|BGP.| |
- | | Client | A system entity that requests and uses a service provided by another system entity, called a " | + | |:::|An inter-autonomous system routing protocol. |
- | | Cold Disaster Recovery Site | Hardware is ordered, shipped and installed, and software is loaded. Basic telecommunications, | + | |Boot Record Infector|A boot record infector is a piece of malware that inserts malicious code into the boot sector of a disk.| |
- | | Collision | A collision occurs when multiple systems transmit simultaneously on the same wire.| | + | |Bot|Also called ‘Internet bots’; refers to computers that perform tasks without human input. |
- | | Common Gateway Interface | + | |Botnet|A botnet is a large number of compromised computers that are used to create and send spam or viruses or flood a network with messages as a denial of service attack.| |
- | | Competitive Intelligence | Competitive Intelligence is espionage using legal, or at least not obviously illegal, means.| | + | |B& |
- | | Competitor Intelligence | Competitor Intelligence is a subdivision of Business intelligence that concerns the current and proposed business activities of competitors.| | + | |BRD|Business Requirements Document. |
- | | Compromise | Also called a security breach, a security compromise is a term used to describe an intentional or unintentional event that has exposed confidential data to unauthorized persons. | + | |Break Glass|Temporary limited access to a production environment. |
- | | Computer Emergency Response Team (CERT) | An organization that studies computer and network INFOSEC in order to provide incident response services to victims of attacks, publish alerts concerning vulnerabilities and threats, and offer other information to help improve computer and network security.| | + | |Bridge|A mechanism (software or hardware) which connect two communication segments. Bridges generally operate at OSI Layer 2 or 3, but may operate from the physical layer up to the application layer. |
- | | Computer Network | A collection of host computers together with the sub-network or inter-network through which they can exchange data.| | + | |BRM|Business Risk Managers.| |
- | | Confidentiality | Confidentiality is the need to ensure that information is disclosed only to those who are authorized to view it.| | + | |Broadcast|To send the same message to an unknown number of destinations without addressing. Examples: ARP, Radio. See also multicast.| |
- | | Configuration Management | Establish a known baseline condition and manage it.| | + | |Broadcast Address|An address used to broadcast a datagram to all hosts on a given network using UDP or ICMP protocol.| |
- | | Cookie | Data exchanged between an HTTP server and a browser (a client of the server) to store state information on the client side and retrieve it later for server use. An HTTP server, when sending data to a client, may send along a cookie, which the client retains after the HTTP connection closes. | + | |Browser|A client computer program that can retrieve and display information from servers on the World Wide Web.| |
- | | Corruption | A threat action that undesirably alters system operation by adversely modifying system functions or data.| | + | |Brute Force|A crypto-analysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, |
- | | Cost Benefit Analysis | A cost benefit analysis compares the cost of implementing countermeasures with the value of the reduced risk.| | + | |BSM|Balance Sheet Management.| |
- | | Countermeasure | Reactive methods used to prevent an exploit from successfully occurring once a threat has been detected. | + | |BSS 7799|British Standard 7799.| |
- | | Covert Channels | Covert Channels are the means by which information can be communicated between two parties in a covert fashion using normal system operations. For example by changing the amount of hard drive space that is available on a file server can be used to communicate information.| | + | |:::|A standard code of practice and provides guidance on how to secure an information system. |
- | | Crawler | A crawler uses existing Internet search engines to carry out automatic search and retrieval of selected Information on behalf of a user. It may also be known as Web crawler.| | + | |BST|British Summer Time.| |
- | | CRC (Cyclic Redundancy Check) | Sometimes called " | + | |Buffer Overflow|A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting or overwriting the valid data held in them.| |
- | | Criminal Forum | A forum, usually web based, devoted to the black market trading of stolen credit card details, stolen identity details and tools to commit computer offences.| | + | |Bullet-proof hosting|Bullet-proof hosting is a service provided by some domain hosting or web hosting firms that allow their customer considerable leniency in the kinds of material they may upload and distribute. |
- | | CRON | Cron is a Unix application that runs jobs for users and administrators at scheduled times of the day.| | + | |Bulletin Board System|BBS| |
- | | Crossover cable | A crossover cable reverses the pairs of cables at the other end and can be used to connect devices directly together.| | + | |:::|A Bulletin Board System (BBS) is a computerized meeting and announcement system that allows people to carry on discussions, |
- | | Cryptanalysis | The mathematical science that deals with analysis of a cryptographic system in order to gain knowledge needed to break or circumvent the protection that the system is designed to provide. In other words, convert the cipher text to plain-text without knowing the key.| | + | |Business Continuity Management|BCM.| |
- | | Cryptographic Algorithm | Hash. An algorithm that employs the science of cryptography, | + | |:::|The management of a Business Continuity Plan (BCP).| |
- | | Cut-through | Cut-Through is a method of switching where only the header of a packet is read before it is forwarded to its destination.| | + | |Business Continuity Plan|BCP.| |
- | | Cyberspace | Cyberspace is the notional environment in which communication over computer networks occurs. | + | |:::|A Business Continuity Plan is the plan for emergency response, backup operations, and post-disaster recovery steps that will ensure the availability of critical resources and facilitate the continuity of operations in an emergency situation.| |
- | | Cyclic Redundancy Check (CRC) | Sometimes called " | + | |Business Impact Analysis|BIA.| |
- | | Daemon | A program which is often started at the time the system boots and runs continuously without intervention from any of the users on the system. | + | |:::|A Business Impact Analysis determines what levels of impact to a system are tolerable.| |
- | | Data Aggregation | Data Aggregation is the ability to get a more complete picture of the information by analyzing several different types of records at once.| | + | |Business Intelligence|Business intelligence is now widely accepted as being concerned with information technology solutions for transforming the output from large data collections into Intelligence; |
- | | Data Custodian | A Data Custodian is the entity currently using or manipulating the data, and therefore, temporarily taking responsibility for the data.| | + | |BYOD|Bring Your Own Device.| |
- | | Data Encryption Standard | + | |Byte|A fundamental unit of computer storage; the smallest addressable unit in a computer' |
- | | Data Encryption Standard (DES) | A widely-used method of data encryption using a private (secret) key. There are 72, | + | |CA|Certificate Authority.| |
- | | Data Mining | Data Mining is a technique used to analyze existing information, | + | |CAB|Change Advisory Board.| |
- | | Data Owner | A Data Owner is the entity having responsibility and authority for the data.| | + | |CAC|Call Admission Control.| |
- | | Data Warehouse | A central repository for all or significant parts of the data that an enterprise’s various business systems collect. | + | |:::|The inspection and control all inbound and outbound voice network activity by a voice firewall based on user-defined policies.| |
- | | Data Warehousing | Data Warehousing is the consolidation of several previously independent databases into one location.| | + | |Cache|Pronounced cash, a special high-speed storage mechanism. |
- | | Datagram | Request for Comment 1594 says, "a self-contained, | + | |Cache Cramming|Cache Cramming is the technique of tricking a browser to run cached Java code from the local disk, instead of the internet zone, so it runs with less restrictive permissions.| |
- | | Day Zero | The "Day Zero" or "Zero Day" is the day a new vulnerability is made known. | + | |Cache Poisoning|Malicious or misleading data from a remote name server is saved [cached] by another name server. |
- | | Ddos (Distributed Denial of Service) | Distributed Denial of Service (DdoS) is an attack in which multiple systems flood the bandwidth or resources of a targeted system in an attempt to make it unavailable. | + | |Call Admission Control|CAC.| |
- | | Decapsulation | Decapsulation is the process of stripping off one layer' | + | |:::|The inspection and control all inbound and outbound voice network activity by a voice firewall based on user-defined policies.| |
- | | Decryption | Decryption is the process of transforming an encrypted message into its original plain-text.| | + | |CAMS|Cash Management System.| |
- | | Deep Web | Invisible Web. That portion (estimated to be between 60 and 80 per cent) of total Web content that consists of material that is not accessible by standard Search engines. | + | |Carding|Carding is a term used for a process to verify the validity of stolen card data. The thief presents the card information on a website that has real-time transaction processing. |
- | | Defacement | Defacement is the method of modifying the content of a website in such a way that it becomes " | + | |Cash-out|The aspect of a cybercrime operation where stolen electronic funds are finally withdrawn from the finance system in the form of hard cash, often perpetrated by the use of ‘money mules’.| |
- | | Defense In-Depth | Defense In-Depth is the approach of using multiple layers of security to guard against failure of a single security component.| | + | |CCO|Chief Controls Office.| |
- | | Demilitarized Zone (DMZ) | In computer security, in general a demilitarized zone (DMZ) or perimeter network is a network area (a sub-network) that sits between an organization' | + | |:::|The Chief Controls Office centralizes and increases the focus on maintaining and enhancing an effective control framework.| |
- | | Denial of Service | The prevention of authorized access to a system resource or the delaying of system operations and functions.| | + | |CDC|Client Data Controls.| |
- | | DES (Data Encryption Standard) | A widely-used method of data encryption using a private (secret) key. There are 72, | + | |CDI|Client Data Interface.| |
- | | Dictionary Attack | An attack that tries all of the phrases or words in a dictionary, trying to crack a password or key. A dictionary attack uses a predefined list of words compared to a brute force attack that tries all possible combinations.| | + | |Cell|A cell is a unit of data transmitted over an ATM network. A cell is also a single physical memory location within flash memory.| |
- | | Diffie-Hellman | A key agreement algorithm published in 1976 by Whitfield Diffie and Martin Hellman. | + | |CERT|Computer Emergency Response Team. |
- | | Digest Authentication | Digest Authentication allows a web client to compute MD5 hashes of the password to prove it has the password.| | + | |Certificate-based Authentication | Certificate-Based Authentication is the use of SSL and certificates to authenticate and encrypt HTTP traffic.| |
- | | Digital Certificate | A digital certificate is an electronic " | + | |CFF|Common File Format.| |
- | | Digital Envelope | A digital envelope is an encrypted message with the encrypted session key.| | + | |CGI|Common Gateway Interface. |
- | | Digital Signature | A digital signature is a hash of a message that uniquely identifies the sender of the message and proves the message hasn't changed since transmission. | | + | |Chain of Custody|Chain of Custody is the important application of the Federal rules of evidence and its handling.| |
- | | Digital Signature Algorithm | + | |Challenge Handshake Authentication Protocol|CHAP. |
- | | Digital Signature Standard | + | |CHAP|Challenge Handshake Authentication Protocol.| |
- | | Disassembly | The process of taking a binary program and deriving the source code from it.| | + | |:::|The Challenge-Handshake Authentication Protocol uses a challenge/ |
- | | Disaster Recovery Plan (DRP) | A Disaster Recovery Plan is the process of recovery of IT systems in the event of a disruption or disaster.| | + | |Chatroom|The name for a discussion group or chat room.| |
- | | Discretionary Access Control | + | |Checksum|A value that is computed by a function that is dependent on the contents of a data object and is stored or transmitted together with the object, for the purpose of detecting changes in the data.| |
- | | Disruption | A circumstance or event that interrupts or prevents the correct operation of system services and functions.| | + | |CI|Configuration Item.| |
- | | Distance Vector | Distance vectors measure the cost of routes to determine the best route to all known networks.| | + | |CIP|Customer Identification Program.| |
- | | Distributed Denial of Service | + | |Cipher|A cryptographic algorithm for encryption and decryption.| |
- | | Distributed Scans | Distributed Scans are scans that use multiple source addresses to gather information.| | + | |Ciphertext|Ciphertext is the encrypted form of the message being sent.| |
- | | DLL (Dynamic Link Library) | A collection of small programs, any of which can be called when needed by a larger program that is running in the computer. | + | |Circuit Switched Network|A circuit switched network is where a single continuous physical circuit connected two endpoints where the route was immutable once set up.| |
- | | DMZ (Demilitarized Zone) | In computer security, in general a demilitarized zone (DMZ) or perimeter network is a network area (a sub-network) that sits between an organization' | + | |CIS|Customer Identification System.| |
- | | DNS (Domain Name System) | The domain name system (DNS) is the way that Internet domain names are located and translated into Internet Protocol addresses. A domain name is a meaningful and easy-to-remember " | + | |CIS|Customer Information System.| |
- | | Domain | A sphere of knowledge, or a collection of facts about some program entities or a number of network points or addresses, identified by a name. On the Internet, a domain consists of a set of network addresses. | + | |CIT|Component Integration Testing.| |
- | | Domain Hijacking | Domain hijacking is an attack by which an attacker takes over a domain by first blocking access to the domain' | + | |CL|Control Language.| |
- | | Domain Name | A domain name locates an organization or other entity on the Internet. | + | |Client|A system entity that requests and uses a service provided by another system entity, called a " |
- | | Domain Name System | + | |CMDB|Configuration Management Database.| |
- | | Download | To download is to retrieve Information from the Internet.| | + | |CMOD|Central Management On Demand.| |
- | | Drop Site | Malware that steals data will upload the information to a Drop Site for later retrieval.| | + | |CMR|Customer Master Record.| |
- | | DSA (Digital Signature Algorithm) | An asymmetric cryptographic algorithm that produces a digital signature in the form of a pair of large numbers. | + | |CMS|Change Management Standard.| |
- | | DSS (Digital Signature Standard | The US Government standard that specifies the Digital Signature Algorithm (DSA), which involves asymmetric cryptography.| | + | |COA|Change of Address.| |
- | | Due Care | Due care ensures that a minimal level of protection is in place in accordance with the best practice in the industry.| | + | |CoB|Close of Business.| |
- | | Due Diligence | Due diligence is the requirement that organizations must develop and deploy a protection plan to prevent fraud, abuse, and additionally deploy a means to detect them if they occur.| | + | |Cold Disaster Recovery Site|Hardware is ordered, shipped and installed, and software is loaded. Basic telecommunications, |
- | | Dump | Generally used to mean the data from a database, in reference to online fraud the term usually refers to debit or credit card’s dumps, which were skimmed or hacked and may include credit card track data, PINs and CCV numbers.| | + | |Collision|A collision occurs when multiple systems transmit simultaneously on the same wire.| |
- | | DumpSec | DumpSec is a security tool that dumps a variety of information about a system' | + | |Common Gateway Interface|CGI. |
- | | Dumpster Diving | Dumpster Diving is obtaining passwords and corporate directories by searching through discarded media.| | + | |Competitive Intelligence|Competitive Intelligence is espionage using legal, or at least not obviously illegal, means.| |
- | | Dynamic Link Library | + | |Competitor Intelligence|Competitor Intelligence is a subdivision of Business intelligence that concerns the current and proposed business activities of competitors.| |
- | | Dynamic Routing Protocol | Allows network devices to learn routes. Ex. RIP, EIGRP Dynamic routing occurs when routers talk to adjacent routers, informing each other of what networks each router is currently connected to. The routers must communicate using a routing protocol, of which there are many to choose from. The process on the router that is running the routing protocol, communicating with its neighbour routers, is usually called a routing daemon. | + | |Compromise|Also called a security breach, a security compromise is a term used to describe an intentional or unintentional event that has exposed confidential data to unauthorized persons. |
- | | EAP (Extensible Authentication Protocol) | A framework that supports multiple, optional authentication mechanisms for PPP, including clear-text passwords, challenge-response, | + | |Computer Emergency Response Team (CERT) | An organization that studies computer and network INFOSEC in order to provide incident response services to victims of attacks, publish alerts concerning vulnerabilities and threats, and offer other information to help improve computer and network security.| |
- | | Eavesdropping | Eavesdropping is simply listening to a private conversation which may reveal information which can provide access to a facility or network.| | + | |Computer Network|A collection of host computers together with the sub-network or inter-network through which they can exchange data.| |
- | | e-Commerce | + | |CON|Change of Name.| |
- | | Echo Reply | An echo reply is the response a machine that has received an echo request sends over ICMP.| | + | |Confidentiality|Confidentiality is the need to ensure that information is disclosed only to those who are authorized to view it.| |
- | | Echo Request | An echo request is an ICMP message sent to a machine to determine if it is online and how long traffic takes to get to it.| | + | |Configuration Management|Establish a known baseline condition and manage it.| |
- | | EFT (Electronic Funds Transfer) | + | |COO|Chief Operating Office.| |
- | | Egress Filtering | Filtering outbound traffic.| | + | |Cookie|Data exchanged between an HTTP server and a browser (a client of the server) to store state information on the client side and retrieve it later for server use. An HTTP server, when sending data to a client, may send along a cookie, which the client retains after the HTTP connection closes. |
- | | Electronic Commerce | + | |Corruption|A threat action that undesirably alters system operation by adversely modifying system functions or data.| |
- | | Electronic Funds Transfer | + | |Cost Benefit Analysis|A cost benefit analysis compares the cost of implementing countermeasures with the value of the reduced risk.| |
- | | Emanations Analysis | Gaining direct knowledge of communicated data by monitoring and resolving a signal that is emitted by a system and that contains the data but is not intended to communicate the data.| | + | |Countermeasure|Reactive methods used to prevent an exploit from successfully occurring once a threat has been detected. |
- | | Encapsulation | The inclusion of one data structure within another structure so that the first data structure is hidden for the time being.| | + | |Covert Channels|Covert Channels are the means by which information can be communicated between two parties in a covert fashion using normal system operations. For example by changing the amount of hard drive space that is available on a file server can be used to communicate information.| |
- | | Encryption | Cryptographic transformation of data (called " | + | |CP|Consultation Paper.| |
- | | EGP (Exterior Gateway Protocol) | + | |CR|Change Record.| |
- | | Ephemeral Port | Also called a transient port or a temporary port. Usually is on the client side. It is set up when a client application wants to connect to a server and is destroyed when the client application terminates. | + | |CR|Change Request.| |
- | | Escrow Passwords | Escrow Passwords are passwords that are written down and stored in a secure location (like a safe) that are used by emergency personnel when privileged personnel are unavailable.| | + | |CRAID|Changes, |
- | | Espionage | Espionage is the use of illegal means (spying) to collect Information, | + | |Crawler|A crawler uses existing Internet search engines to carry out automatic search and retrieval of selected Information on behalf of a user. It may also be known as Web crawler.| |
- | | Ethernet | The most widely-installed LAN technology. | + | |CRC|Cyclic Redundancy Check.| |
- | | Event | An event is an observable occurrence in a system or network.| | + | |:::|Sometimes called " |
- | | Exploit | A sequence of actions or a program that enables an individual to take advantage of, or exploit, a vulnerability or security weakness in a program or system.| | + | |Criminal Forum|A forum, usually web based, devoted to the black market trading of stolen credit card details, stolen identity details and tools to commit computer offences.| |
- | | Exponential Backoff Algorithm | An exponential backoff algorithm is used to adjust TCP timeout values on the fly so that network devices don't continue to timeout sending data over saturated links.| | + | |CRON|Cron is a Unix application that runs jobs for users and administrators at scheduled times of the day.| |
- | | Exposure | A threat action whereby sensitive data is directly released to an unauthorized entity.| | + | |Crossover cable | A crossover cable reverses the pairs of cables at the other end and can be used to connect devices directly together.| |
- | | Extended ACLS | Cisco. | + | |Cryptanalysis|The mathematical science that deals with analysis of a cryptographic system in order to gain knowledge needed to break or circumvent the protection that the system is designed to provide. In other words, convert the cipher text to plain-text without knowing the key.| |
- | | Extensible Authentication Protocol | + | |Cryptographic Algorithm|Hash. |
- | | Exterior Gateway Protocol | + | |CSI|Continual Service Improvements.| |
- | | Extranet | Extranet is that portion of an organization’s Intranet that is accessible by selected individuals (for example, collaborators, | + | |CSP|Content Security Policy.| |
- | | False Rejects | False Rejects are when an authentication system fails to recognize a valid user.| | + | |CTRP|Countries, |
- | | Fast File System | The first major revision to the Unix file system, providing faster read access and faster (delayed, asynchronous) write access through a disk cache and better file system layout on disk. It uses inodes (pointers) and data blocks.| | + | |Cut-through|Cut-Through is a method of switching where only the header of a packet is read before it is forwarded to its destination.| |
- | | Fast Flux | Protection method used by botnets consisting of a continuous and fast change of the DNS records for a domain name through different IP addresses.| | + | |Cyberspace|Cyberspace is the notional environment in which communication over computer networks occurs. |
- | | Fault Line Attacks | Fault Line Attacks use weaknesses between interfaces of systems to exploit gaps in coverage.| | + | |Cyclic Redundancy Check|CRC. |
- | | File Transfer Protocol | + | |Daemon|A program which is often started at the time the system boots and runs continuously without intervention from any of the users on the system. |
- | | Filter | + | |Data Aggregation|Data Aggregation is the ability to get a more complete picture of the information by analyzing several different types of records at once.| |
- | | Filtering Router | An inter-network router that selectively prevents the passage of data packets according to a security policy. | + | |Data Custodian|A Data Custodian is the entity currently using or manipulating the data, and therefore, temporarily taking responsibility for the data.| |
- | | Finger | A protocol to lookup user information on a given host. A Unix program that takes an e-mail address as input and returns information about the user who owns that e-mail address. | + | |Data Encryption Standard|DES. A widely-used method of data encryption using a private (secret) key. There are 72, |
- | | Fingerprinting | Sending strange packets to a system in order to gauge how it responds to determine the operating system.| | + | |Data Mining|Data Mining is a technique used to analyze existing information, |
- | | Firewall | A logical or physical discontinuity in a network to prevent unauthorized access to data or resources.| | + | |Data Owner|A Data Owner is the entity having responsibility and authority for the data.| |
- | | Flooding | An attack that attempts to cause a failure in (especially, | + | |Data Warehouse|A central repository for all or significant parts of the data that an enterprise’s various business systems collect. |
- | | Forest | A forest is a set of Active Directory domains that replicate their databases with each other.| | + | |Data Warehousing|Data Warehousing is the consolidation of several previously independent databases into one location.| |
- | | Fork Bomb | A Fork Bomb works by using the fork() call to create a new process which is a copy of the original. | + | |Datagram|Request for Comment 1594 says, "a self-contained, |
- | | Form-based Authentication | Form-Based Authentication uses forms on a webpage to ask a user to input username and password information.| | + | |Day Zero|The "Day Zero" or "Zero Day" is the day a new vulnerability is made known. |
- | | Forward Lookup | Forward lookup uses an Internet domain name to find an IP address.| | + | |DB|Database.| |
- | | Forward Proxy | Forward Proxies are designed to be the server through which all requests are made.| | + | |DBC|Detailed Business Case.| |
- | | Fragment Offset | The fragment offset field tells the sender where a particular fragment falls in relation to other fragments in the original larger packet.| | + | |DCF|Data Control Framework.| |
- | | Fragment Overlap Attack | A TCP/IP Fragmentation Attack that is possible because IP allows packets to be broken down into fragments for more efficient transport across various media. | + | |DCO|Device Configuration Overlay.| |
- | | Fragmentation | The process of storing a data file in several " | + | |:::|A hidden part of a hard drive that is used by personal computer manufacturers to specify the configuration of a hard drive (regardless of its actual size) to present the same number of sectors to the BIOS and operating system.| |
- | | Frames | Data that is transmitted between network points as a unit complete with addressing and necessary protocol control information. | + | |DCP|Demand Change Process.| |
- | | FTP (File Transfer Protocol) | A TCP/IP protocol specifying the transfer of text or binary files across the network.| | + | |DDOS|Distributed Denial of Service.| |
- | | Full Duplex | A type of duplex communications channel which carries data in both directions at once. Refers to the transmission of data in two directions simultaneously. | + | |:::|Distributed Denial of Service (DDOS) is an attack in which multiple systems flood the bandwidth or resources of a targeted system in an attempt to make it unavailable. |
- | | Fully-Qualified Domain Name | A Fully-Qualified Domain Name is a server name with a hostname followed by the full domain name.| | + | |Decapsulation | Decapsulation is the process of stripping off one layer' |
- | | Fuzzing | The use of special regression testing tools to generate out-of-spec input for an application in order to find security vulnerabilities. Also see " | + | |Decryption|Decryption is the process of transforming an encrypted message into its original plain-text.| |
- | | Gateway | A network point that acts as an entrance to another network.| | + | |Deep Web|Invisible Web. That portion (estimated to be between 60 and 80 per cent) of total Web content that consists of material that is not accessible by standard Search engines. |
- | | GETHOSTBYADDR | The gethostbyaddr DNS query is when the address of a machine is known and the name is needed.| | + | |Defacement|Defacement is the method of modifying the content of a website in such a way that it becomes " |
- | | GETHOSTBYNAME | The gethostbyname DNS quest is when the name of a machine is known and the address is needed.| | + | |Defense In-Depth|Defense In-Depth is the approach of using multiple layers of security to guard against failure of a single security component.| |
- | | GNU | GNU is a Unix-like operating system that comes with source code that can be copied, modified, and redistributed. | + | |Demilitarized Zone|DMZ.| |
- | | GNUTELLA | An Internet file sharing utility. | + | |:::|In computer security, in general a demilitarized zone (DMZ) or perimeter network is a network area (a sub-network) that sits between an organization' |
- | | Hactivist | An activist who uses illegal or legally ambiguous digital tools or methods in pursuit of political ends; methods employed include web site defacements, | + | |Denial of Service|The prevention of authorized access to a system resource or the delaying of system operations and functions.| |
- | | Hardening | Hardening is the process of identifying and fixing vulnerabilities on a system.| | + | |DES|Data Encryption Standard).| |
- | | Hash Function | An algorithm that computes a value based on a data object thereby mapping the data object to a smaller data object.| | + | |:::|A widely-used method of data encryption using a private (secret) key. There are 72, |
- | | Hash Functions | (cryptographic) hash functions are used to generate a one way "check sum" for a larger text, which is not trivially reversed. | + | |D& |
- | | Header | A header is the extra information in a packet that is needed for the protocol stack to process the packet.| | + | |Dictionary Attack|An attack that tries all of the phrases or words in a dictionary, trying to crack a password or key. A dictionary attack uses a predefined list of words compared to a brute force attack that tries all possible combinations.| |
- | | Hijack Attack | A form of active wiretapping in which the attacker seizes control of a previously established communication association.| | + | |Diffie-Hellman|A key agreement algorithm published in 1976 by Whitfield Diffie and Martin Hellman. |
- | | Honey Client | See Honeymonkey.| | + | |Digest Authentication|Digest Authentication allows a web client to compute MD5 hashes of the password to prove it has the password.| |
- | | Honey Pot | Programs that simulate one or more network services that you designate on your computer' | + | |Digital Certificate|A digital certificate is an electronic " |
- | | Honeymonkey | Automated system simulating a user browsing websites. | + | |Digital Envelope|A digital envelope is an encrypted message with the encrypted session key.| |
- | | Hops | A hop is each exchange with a gateway a packet takes on its way to the destination.| | + | |Digital Signature|A digital signature is a hash of a message that uniquely identifies the sender of the message and proves the message hasn't changed since transmission. | |
- | | Host | Any computer that has full two-way access to other computers on the Internet. | + | |Digital Signature Algorithm|DSA.| |
- | | Host-based ID | Host-based intrusion detection systems use information from the operating system audit records to watch all operations occurring on the host that the intrusion detection software has been installed upon. These operations are then compared with a pre-defined security policy. | + | |:::|An asymmetric cryptographic algorithm that produces a digital signature in the form of a pair of large numbers. |
- | | Host-Based Intrusion Detection | Host-based intrusion detection systems use information from the operating system audit records to watch all operations occurring on the host that the intrusion detection software has been installed upon. These operations are then compared with a pre-defined security policy. | + | |Digital Signature Standard|DSS.| |
- | | Hot Disaster Recovery Site | It contains fully redundant hardware and software, with telecommunications, | + | |:::|The US Government standard that specifies the Digital Signature Algorithm (DSA), which involves asymmetric cryptography.| |
- | | Hot Fix | A hot fix is a single, cumulative package that includes one or more files that are used to address a problem in a software product (i.e. a software bug). Typically, hot fixes are made to address a specific customer situation and are not rolled out across the organisation. | + | |Disassembly|The process of taking a binary program and deriving the source code from it.| |
- | | HTML (Hypertext Markup Language) | The set of markup symbols or codes inserted in a file intended for display on a World Wide Web browser page.| | + | |Disaster Recovery Plan|DRP.| |
- | | HTTP (Hypertext Transfer Protocol) | The protocol in the Internet Protocol (IP) family used to transport hypertext documents across an internet.| | + | |:::|A Disaster Recovery Plan is the process of recovery of IT systems in the event of a disruption or disaster.| |
- | | HTTP Proxy | An HTTP Proxy is a server that acts as a middleman in the communication between HTTP clients and servers.| | + | |Discretionary Access Control|DAC.| |
- | | HTTPS | When used in the first part of a URL (the part that precedes the colon and specifies an access scheme or protocol), this term specifies the use of HTTP enhanced by a security mechanism, which is usually SSL. | | + | |:::|Discretionary Access Control consists of something the user can manage, such as a document password.| |
- | | HUB | A hub is a network device that operates by repeating data that it receives on one port to all the other ports. | + | |Dispensation|Temporary exclusion from Policy or Scope.| |
- | | Humint | + | |Disruption|A circumstance or event that interrupts or prevents the correct operation of system services and functions.| |
- | | Hybrid Attack | A Hybrid Attack builds on the dictionary attack method by adding numerals and symbols to dictionary words.| | + | |Distance Vector|Distance vectors measure the cost of routes to determine the best route to all known networks.| |
- | | Hybrid Encryption | An application of cryptography that combines two or more encryption algorithms, particularly a combination of symmetric and asymmetric encryption.| | + | |Distributed Denial of Service|DDOS.| |
- | | Hyperlink | In hypertext or hypermedia, an information object (such as a word, a phrase, or an image; usually highlighted by color or underscoring) that points (indicates how to connect) to related information that is located elsewhere and can be retrieved by activating the link.| | + | |:::|Distributed Denial of Service (DDOS) is an attack in which multiple systems flood the bandwidth or resources of a targeted system in an attempt to make it unavailable. |
- | | Hypertext Markup Language | + | |Distributed Scans|Distributed Scans are scans that use multiple source addresses to gather information.| |
- | | Hypertext Transfer Protocol | + | |DLL|Dynamic Link Library.| |
- | | ICMP (Internet Control Message Protocol) | An Internet Standard protocol that is used to report error conditions during IP datagram processing and to exchange other information concerning the state of the IP network.| | + | |:::|A collection of small programs, any of which can be called when needed by a larger program that is running in the computer. |
- | | Identity | Identity is whom someone or what something is, for example, the name by which something is known.| | + | |DLP|Data Loss Prevention.| |
- | | IETF (Internet Engineering Task Force) | The body that defines standard Internet operating protocols such as TCP/ | + | |DMS|Document Management System.| |
- | | IMAP (Internet Message Access Protocol) | A protocol that defines how a client should fetch mail from and return mail to a mail server. | + | |DM& |
- | | Incident | An incident as an adverse network event in an information system or network or the threat of the occurrence of such an event.| | + | |DMZ|Demilitarized Zone.| |
- | | Incident Handling | Incident Handling is an action plan for dealing with intrusions, cyber-theft, | + | |:::|In computer security, in general a demilitarized zone (DMZ) or perimeter network is a network area (a sub-network) that sits between an organization' |
- | | Incremental Backups | Incremental backups only backup the files that have been modified since the last backup. | + | |DNS|Domain Name System.| |
- | | Industrial Espionage | Espionage is the use of illegal means (spying) to collect Information, | + | |:::|The domain name system (DNS) is the way that Internet domain names are located and translated into Internet Protocol addresses. A domain name is a meaningful and easy-to-remember " |
- | | INETD | Inetd (or Internet Daemon) is an application that controls smaller internet services like telnet, ftp, and POP.| | + | |Domain|A sphere of knowledge, or a collection of facts about some program entities or a number of network points or addresses, identified by a name. On the Internet, a domain consists of a set of network addresses. |
- | | Inference Attack | Inference Attacks rely on the user to make logical connections between seemingly unrelated pieces of information.| | + | |Domain Hijacking|Domain hijacking is an attack by which an attacker takes over a domain by first blocking access to the domain' |
- | | Information Warfare | Information Warfare is the competition between offensive and defensive players over information resources.| | + | |Domain Name|A domain name locates an organization or other entity on the Internet. |
- | | Ingress Filtering | Ingress Filtering is filtering inbound traffic.| | + | |Domain Name System|DNS.| |
- | | Input Validations Attack | Input Validations Attacks are where an attacker intentionally sends unusual input in the hopes of confusing an application.| | + | |:::|The domain name system (DNS) is the way that Internet domain names are located and translated into Internet Protocol addresses. A domain name is a meaningful and easy-to-remember " |
- | | Integrity | Integrity is the need to ensure that information has not been changed accidentally or deliberately, | + | |Download|To download is to retrieve Information from the Internet.| |
- | | Integrity Star Property | In Integrity Star Property a user cannot read data of a lower integrity level then their own.| | + | |DP|Discussion Paper.| |
- | | Intellectual Property | Intellectual Property refers to the definition and recording of a novel device, product, process or technique so that it may be bought, sold or legally protected. | + | |DPIA|Data Protection Input Assessment.| |
- | | Intelligence | Intelligence is high-level, processed, exploitable Information.| | + | |DR|Disaster Recovery. |
- | | International Organization for Standardization (ISO) | A voluntary, non-treaty, non-government organization, | + | |Drop Site|Malware that steals data will upload the information to a Drop Site for later retrieval.| |
- | | International Telecommunications Union (ITU-T) | Telecommunication Standardization Sector (formerly " | + | |DSA|Digital Signature Algorithm.| |
- | | Internet | A term to describe connecting multiple separate networks together.| | + | |:::|An asymmetric cryptographic algorithm that produces a digital signature in the form of a pair of large numbers. |
- | | Internet Control Message Protocol | + | |DSS|Digital Signature Standard.| |
- | | Internet Engineering Task Force (IETF) | The body that defines standard Internet operating protocols such as TCP/ | + | |:::|The US Government standard that specifies the Digital Signature Algorithm (DSA), which involves asymmetric cryptography.| |
- | | Internet Message Access Protocol | + | |DTU|Data Transfer Utility.| |
- | | Internet Protocol | + | |Due Care|Due care ensures that a minimal level of protection is in place in accordance with the best practice in the industry.| |
- | | Internet Protocol Security | + | |Due Diligence|Due diligence is the requirement that organizations must develop and deploy a protection plan to prevent fraud, abuse, and additionally deploy a means to detect them if they occur.| |
- | | Internet Relay Chat (IRC) | Internet Relay Chat (IRC) is a huge, multi-user live chat facility. | + | |Dump|Generally used to mean the data from a database, in reference to online fraud the term usually refers to debit or credit card’s dumps, which were skimmed or hacked and may include credit card track data, PINs and CCV numbers.| |
- | | Internet Service Provider | + | |DumpSec|DumpSec is a security tool that dumps a variety of information about a system' |
- | | Internet Standard | A specification, | + | |Dumpster Diving|Dumpster Diving is obtaining passwords and corporate directories by searching through discarded media.| |
- | | Interrupt | An Interrupt is a signal that informs the OS that something has occurred.| | + | |DWB|Dispensation, |
- | | Intranet | A computer network, especially one based on Internet technology, that an organization uses for its own internal, and usually private, purposes and that is closed to outsiders.| | + | |DX|Developer Experience.| |
- | | Intrusion Detection | A security management system for computers and networks. | + | |Dynamic Link Library|DLL.| |
- | | Invisible Web | Invisible Web is that portion (estimated to be between 60 and 80 per cent) of total Web content that consists of material that is not accessible by standard Search engines. | + | |:::|A collection of small programs, any of which can be called when needed by a larger program that is running in the computer. |
- | | IP (Internet Protocol) | The method or protocol by which data is sent from one computer to another on the Internet.| | + | |Dynamic Routing Protocol|Allows network devices to learn routes. Ex. RIP, EIGRP Dynamic routing occurs when routers talk to adjacent routers, informing each other of what networks each router is currently connected to. The routers must communicate using a routing protocol, of which there are many to choose from. The process on the router that is running the routing protocol, communicating with its neighbour routers, is usually called a routing daemon. |
- | | IP Address | A computer' | + | |E2E|End-to-End. |
- | | IP Flood | A denial of service attack that sends a host more echo request (" | + | |EAD|Exposure at Default.| |
- | | IP Forwarding | IP forwarding is an Operating System option that allows a host to act as a router. | + | |EAP|Extensible Authentication Protocol.| |
- | | IPSEC (Internet Protocol Security) | A developing standard for security at the network or packet processing layer of network communication.| | + | |:::|A framework that supports multiple, optional authentication mechanisms for PPP, including clear-text passwords, challenge-response, |
- | | IP Spoofing | The technique of supplying a false IP address.| | + | |Eavesdropping|Eavesdropping is simply listening to a private conversation which may reveal information which can provide access to a facility or network.| |
- | | IRC (Internet Relay Chat) | Internet Relay Chat (IRC) is a huge, multi-user live chat facility. | + | |e-Commerce|Electronic Commerce, also known as e-Commerce, covers a range of activities under which businesses and their customers can carry out transactions electronically between computer systems. |
- | | ISO (International Organization for Standardization) | A voluntary, non-treaty, non-government organization, | + | |Echo Reply| An echo reply is the response a machine that has received an echo request sends over ICMP.| |
- | | ISP (Internet Service Provider) | An Internet Service Provider (ISP) is a company selling access to the Internet.| | + | |Echo Request|An echo request is an ICMP message sent to a machine to determine if it is online and how long traffic takes to get to it.| |
- | | Issue-specific Policy | An Issue-Specific Policy is intended to address specific needs within an organization, | + | |EDS|European Data Store.| |
- | | ITU-T (International Telecommunications Union) | Telecommunication Standardization Sector (formerly " | + | |EFT|Electronic Funds Transfer is the transfer of cash or credit from one account to another using computers and telecommunications.| |
- | | Jitter | Jitter or Noise is the modification of fields in a database while preserving the aggregate characteristics of that make the database useful in the first place.| | + | |Egress Filtering | Filtering outbound traffic.| |
- | | Jump Bag | A Jump Bag is a container that has all the items necessary to respond to an incident inside to help mitigate the effects of delayed reactions.| | + | |EGP|Exterior Gateway Protocol). |
- | | Kerberos | A system developed at the Massachusetts Institute of Technology that depends on passwords and symmetric cryptography (DES) to implement ticket-based, | + | |:::|A protocol which distributes routing information to the routers which connect autonomous systems.| |
- | | Kernel | The essential centre of a computer operating system, the core that provides basic services for all other parts of the operating system. | + | |EGW|Engagement Gateway.| |
- | | L2F (Layer 2 Forwarding Protocol) | An Internet protocol (originally developed by Cisco Corporation) that uses tunnelling of PPP over IP to create a virtual extension of a dial-up link across a network, initiated by the dial-up server and transparent to the dial-up user.| | + | |EIN|Employee Identification Number.| |
- | | L2FP (Layer 2 Tunnelling | + | |Electronic Commerce|Electronic Commerce, also known as e-Commerce, covers a range of activities under which businesses and their customers can carry out transactions electronically between computer systems. |
- | | Lattice Techniques | Lattice Techniques use security designations to determine access to information.| | + | |Electronic Funds Transfer|Electronic Funds Transfer |
- | | Layer 2 Forwarding Protocol | + | |Emanations Analysis|Gaining direct knowledge of communicated data by monitoring and resolving a signal that is emitted by a system and that contains the data but is not intended to communicate the data.| |
- | | Layer 2 Tunnelling | + | |Encapsulation|The inclusion of one data structure within another structure so that the first data structure is hidden for the time being.| |
- | | Least Privilege | Least Privilege is the principle of allowing users or applications the least amount of permissions necessary to perform their intended function.| | + | |Encryption|Cryptographic transformation of data (called " |
- | | Legion | Software to detect unprotected shares.| | + | |EOD|End-of-Day.| |
- | | Lightweight Directory Access Protocol | + | |Ephemeral Port|Also called a transient port or a temporary port. Usually is on the client side. It is set up when a client application wants to connect to a server and is destroyed when the client application terminates. |
- | | Link State | With link state, routes maintain information about all routers and router-to-router links within a geographic area, and creates a table of best routes with that information.| | + | |Escrow Passwords|Escrow Passwords are passwords that are written down and stored in a secure location (like a safe) that are used by emergency personnel when privileged personnel are unavailable.| |
- | | List-based Access Control | List Based Access Control associates a list of users and their privileges with each object.| | + | |Espionage|Espionage is the use of illegal means (spying) to collect Information, |
- | | LKM (Loadable Kernel Modules) | Loadable Kernel Modules allow for the adding of additional functionality directly into the kernel while the system is running.| | + | |Ethernet|The most widely-installed LAN technology. |
- | | Loadable Kernel Modules | + | |ETL|Extract, |
- | | Log Clipping | Log clipping is the selective removal of log entries from a system log to hide a compromise.| | + | |EUDA|End User Developed Application.| |
- | | Logic Bombs | Logic bombs are programs or snippets of code that execute when a certain predefined event occurs. | + | |Event|An event is an observable occurrence in a system or network.| |
- | | Logic Gate | A logic gate is an elementary building block of a digital circuit. | + | |EXCO|Executive Committee, Executive Council.| |
- | | Loopback Address | The loopback address (127.0.0.1) is a pseudo IP address that always refer back to the local host and are never sent out onto a network.| | + | |Exploit|A sequence of actions or a program that enables an individual to take advantage of, or exploit, a vulnerability or security weakness in a program or system.| |
- | | MAC (Mandatory Access Control) | Mandatory Access Control controls is where the system controls access to resources based on classification levels assigned to both the objects and the users. | + | |Exponential Backoff Algorithm|An exponential backoff algorithm is used to adjust TCP timeout values on the fly so that network devices don't continue to timeout sending data over saturated links.| |
- | | MAC Address | A physical address; a numeric value that uniquely identifies that network device from every other device on the planet.| | + | |Exposure|A threat action whereby sensitive data is directly released to an unauthorized entity.| |
- | | Malicious Code | Software (e.g., Trojan horse) that appears to perform a useful or desirable function, but actually gains unauthorized access to system resources or tricks a user into executing other malicious logic.| | + | |Extended ACLS|Cisco. |
- | | Malware | A generic term for a number of different types of malicious code.| | + | |Extensible Authentication Protocol|EAP.| |
- | | Mandatory Access Control | + | |:::|A framework that supports multiple, optional authentication mechanisms for PPP, including clear-text passwords, challenge-response, |
- | | Man in the Middle | + | |Exterior Gateway Protocol|EGP.| |
- | | Masquerade Attack | A type of attack in which one system entity illegitimately poses as (assumes the identity of) another entity.| | + | |:::|A protocol which distributes routing information to the routers which connect autonomous systems.| |
- | | MD5 | A one way cryptographic hash function. | + | |Extranet|Extranet is that portion of an organization’s Intranet that is accessible by selected individuals (for example, collaborators, |
- | | Measures of Effectiveness | + | |False Rejects|False Rejects are when an authentication system fails to recognize a valid user.| |
- | | MITM (Man in the Middle) Attack | + | |Fast File System|The first major revision to the Unix file system, providing faster read access and faster (delayed, asynchronous) write access through a disk cache and better file system layout on disk. It uses inodes (pointers) and data blocks.| |
- | | MOE (Measures of Effectiveness) | Measures of Effectiveness is a probability model based on engineering concepts that allows one to approximate the impact a give action will have on an environment. In Information warfare it is the ability to attack or defend within an Internet environment.| | + | |Fast Flux|Protection method used by botnets consisting of a continuous and fast change of the DNS records for a domain name through different IP addresses.| |
- | | Monoculture | Monoculture is the case where a large number of users run the same software, and are vulnerable to the same attacks.| | + | |FAT|Functional Acceptance Testing.| |
- | | Morris Worm | A worm program written by Robert T. Morris, Jr. that flooded the ARPANET in November, 1988, causing problems for thousands of hosts.| | + | |:::|See FCT.| |
- | | Mule | Also known as a money mule, a mule is an individual who transfers stolen money or merchandise either in person, through a courier service or electronically to help obscure a scammer’s identity and/or location. | + | |Fault Line Attacks|Fault Line Attacks use weaknesses between interfaces of systems to exploit gaps in coverage.| |
- | | Multi-Cast | Broadcasting from one host to a given set of hosts.| | + | |FCT|Functional Confidence Testing.| |
- | | Multi-Homed | You are " | + | |::: |
- | | Multiplexing | To combine multiple signals from possibly disparate sources, in order to transmit them over a single path.| | + | |File Transfer Protocol|FTP. |
- | | NAT (Network Address Translation) | It is used to share one or a small number of publicly routable IP addresses among a larger number of hosts. | + | |Filter A filter is used to specify which packets will or will not be used. It can be used in sniffers to determine which packets get displayed, or by firewalls to determine which packets get blocked.| |
- | | National Institute of Standards and Technology | + | |Filtering Router|An inter-network router that selectively prevents the passage of data packets according to a security policy. |
- | | Natural Disaster | Any "act of God" (e.g., fire, flood, earthquake, lightning, or wind) that disables a system component.| | + | |Finger|A protocol to lookup user information on a given host. A Unix program that takes an e-mail address as input and returns information about the user who owns that e-mail address. |
- | | Netmask | 32-bit number indicating the range of IP addresses residing on a single IP network/ | + | |Fingerprinting|Sending strange packets to a system in order to gauge how it responds to determine the operating system.| |
- | | Network Address Translation | + | |Firewall|A logical or physical discontinuity in a network to prevent unauthorized access to data or resources.| |
- | | Network-based IDS | A network-based IDS system monitors the traffic on its network segment as a data source. | + | |Flooding|An attack that attempts to cause a failure in (especially, |
- | | Network Mapping | To compile an electronic inventory of the systems and the services on your network.| | + | |Forest|A forest is a set of Active Directory domains that replicate their databases with each other.| |
- | | Network Taps | Network taps are hardware devices that hook directly onto the network cable and send a copy of the traffic that passes through it to one or more other networked devices.| | + | |Fork Bomb|A Fork Bomb works by using the fork() call to create a new process which is a copy of the original. |
- | | Newsgroup | Newsgroup is the name for a discussion group or chat room.| | + | |Form-based Authentication|Form-Based Authentication uses forms on a webpage to ask a user to input username and password information.| |
- | | Nginx | Nginx Web Server. | + | |Forward Lookup|Forward lookup uses an Internet domain name to find an IP address.| |
- | | Node | Node is any single device connected to a Network.| | + | |Forward Proxy|Forward Proxies are designed to be the server through which all requests are made.| |
- | | Non-printable character | A character that doesn' | + | |FQDN|Fully Qualified Domain Name. The name of the physical host including the domain name; and where necessary the name of the DNS alias or availability group listener the application uses to connect.| |
- | | Non-repudiation | Non-repudiation is the ability for a system to prove that a specific user and only that specific user sent a message and that it hasn't been modified.| | + | |Fragment Offset|The fragment offset field tells the sender where a particular fragment falls in relation to other fragments in the original larger packet.| |
- | | Null Session | Known as Anonymous Logon, it is a way of letting an anonymous user retrieve information such as user names and shares over the network or connect without authentication. It is used by applications such as explorer.exe to enumerate shares on remote servers.| | + | |Fragment Overlap Attack|A TCP/IP Fragmentation Attack that is possible because IP allows packets to be broken down into fragments for more efficient transport across various media. |
- | | Octet | A sequence of eight bits. An octet is an eight-bit byte.| | + | |Fragmentation|The process of storing a data file in several " |
- | | One-way Encryption | Irreversible transformation of plain-text to cipher text, such that the plain-text cannot be recovered from the cipher text by other than exhaustive procedures even if the cryptographic key is known.| | + | |Frames|Data that is transmitted between network points as a unit complete with addressing and necessary protocol control information. |
- | | One-way Function | A (mathematical) function, f, which is easy to compute the output based on a given input. | + | |FTP|File Transfer Protocol).| |
- | | Open Shortest Path First (OSPF) | + | |:::|A TCP/IP protocol specifying the transfer of text or binary files across the network.| |
- | | Open Source Information | Open source information is unclassified published information. | + | |Full Duplex|A type of duplex communications channel which carries data in both directions at once. Refers to the transmission of data in two directions simultaneously. |
- | | Open Systems Interconnection | + | |Fully-Qualified Domain Name|A Fully-Qualified Domain Name is a server name with a hostname followed by the full domain name.| |
- | | OSI (Open Systems Interconnection) | OSI is a standard description or " | + | |Fuzzing|The use of special regression testing tools to generate out-of-spec input for an application in order to find security vulnerabilities. Also see " |
- | | OSI Layers | The main idea in OSI is that the process of communication between two end points in a telecommunication network can be divided into layers, with each layer adding its own set of special, related functions. | + | |Gateway|A network point that acts as an entrance to another network.| |
- | | OSPF (Open Shortest Path First) | + | |GETHOSTBYADDR|The gethostbyaddr DNS query is when the address of a machine is known and the name is needed.| |
- | | Overload | Hindrance of system operation by placing excess burden on the performance capabilities of a system component.| | + | |GETHOSTBYNAME|The gethostbyname DNS quest is when the name of a machine is known and the address is needed.| |
- | | Packet | A piece of a message transmitted over a packet-switching network. One of the key features of a packet is that it contains the destination address in addition to the data. In IP networks, packets are often called datagrams.| | + | |GIS|Global Information Security.| |
- | | Packet Switched Network | A packet switched network is where individual packets each follow their own paths through the network from one endpoint to another.| | + | |GNU|GNU is a Unix-like operating system that comes with source code that can be copied, modified, and redistributed. |
- | | Partitions | Major divisions of the total physical hard disk space.| | + | |GNUTELLA|An Internet file sharing utility. |
- | | Password Authentication Protocol | + | |GTIS|Global Technology Infrastructure Group.| |
- | | Password Cracking | Password cracking is the process of attempting to guess passwords, given the password file information.| | + | |GW|Gateway.| |
- | | Password Sniffing | Passive wiretapping, | + | |Hactivist|An activist who uses illegal or legally ambiguous digital tools or methods in pursuit of political ends; methods employed include web site defacements, |
- | | Patch | A patch is a small update released by a software manufacturer to fix bugs in existing programs.| | + | |HAM|Hardware Asset Management.| |
- | | Patching | Patching is the process of updating software to a different version.| | + | |Hardening|Hardening is the process of identifying and fixing vulnerabilities on a system.| |
- | | Payload | Payload is the actual application data a packet contains.| | + | |Hash Function|An algorithm that computes a value based on a data object thereby mapping the data object to a smaller data object.| |
- | | Penetration | Gaining unauthorized logical access to sensitive data by circumventing a system' | + | |Hash Functions|(cryptographic) hash functions are used to generate a one way "check sum" for a larger text, which is not trivially reversed. |
- | | Penetration Testing | Penetration testing is used to test the external perimeter security of a network or facility.| | + | |Header|A header is the extra information in a packet that is needed for the protocol stack to process the packet.| |
- | | PERL (Practical Extraction and Reporting Language) | A script programming language that is similar in syntax to the C language and that includes a number of popular Unix facilities such as sed, awk, and tr.| | + | |Hijack Attack|A form of active wiretapping in which the attacker seizes control of a previously established communication association.| |
- | | Permutation | Permutation keeps the same letters but changes the position within a text to scramble the message.| | + | |Honey Client|See Honeymonkey.| |
- | | Personal Firewalls | Personal firewalls are those firewalls that are installed and run on individual PCs.| | + | |Honey Pot|Programs that simulate one or more network services that you designate on your computer' |
- | | PFS (Public Key Forward Secrecy) | For a key agreement protocol based on asymmetric cryptography, | + | |Honeymonkey|Automated system simulating a user browsing websites. |
- | | Pharming | This is a more sophisticated form of MITM attack. | + | |Hops|A hop is each exchange with a gateway a packet takes on its way to the destination.| |
- | | Phishing | The use of e-mails that appear to originate from a trusted source to trick a user into entering valid credentials at a fake website. | + | |Host|Any computer that has full two-way access to other computers on the Internet. |
- | | Ping of Death | An attack that sends an improperly large ICMP echo request packet (a " | + | |Host-based ID|Host-based intrusion detection systems use information from the operating system audit records to watch all operations occurring on the host that the intrusion detection software has been installed upon. These operations are then compared with a pre-defined security policy. |
- | | Ping Scan | A ping scan looks for machines that are responding to ICMP Echo Requests.| | + | |Host-Based Intrusion Detection|Host-based intrusion detection systems use information from the operating system audit records to watch all operations occurring on the host that the intrusion detection software has been installed upon. These operations are then compared with a pre-defined security policy. |
- | | Ping Sweep | An attack that sends ICMP echo requests (" | + | |Hot Disaster Recovery Site|It contains fully redundant hardware and software, with telecommunications, |
- | | PGP (Pretty Good Privacy) | Trademark of Network Associates, Inc., referring to a computer program (and related protocols) that uses cryptography to provide data security for electronic mail and other applications on the Internet.| | + | |Hot Fix|A hot fix is a single, cumulative package that includes one or more files that are used to address a problem in a software product (i.e. a software bug). Typically, hot fixes are made to address a specific customer situation and are not rolled out across the organisation. |
- | | PKI (Public Key Infrastructure) | + | |HPA|Host Protected Area. Sometimes called the Hidden Protected Area is a section of a hard drive that is hidden or not normally visible to the operating system, and is often used by software or personal computer manufactorers for system recovery and the backup of system configuration data.| |
- | | Plaintext | Ordinary readable text before being encrypted into ciphertext or after being decrypted.| | + | |HTML|Hypertext Markup Language. |
- | | PoC (Proof of Concept) | A proof of concept is realisation of a certain method or idea to demonstrate its feasibility, | + | |HTTP|Hypertext Transfer Protocol. |
- | | Point-to-Point | + | |HTTP Proxy|An HTTP Proxy is a server that acts as a middleman in the communication between HTTP clients and servers.| |
- | | Point-to-Point | + | |HTTPS|When used in the first part of a URL (the part that precedes the colon and specifies an access scheme or protocol), this term specifies the use of HTTP enhanced by a security mechanism, which is usually SSL. | |
- | | Poison Reverse | Split horizon with poisoned reverse (more simply, poison reverse) does include such routes in updates, but sets their metrics to infinity. In effect, advertising the fact that there routes are not reachable.| | + | |HUB|A hub is a network device that operates by repeating data that it receives on one port to all the other ports. |
- | | Polyinstantiation | Polyinstantiation is the ability of a database to maintain multiple records with the same key. It is used to prevent inference attacks.| | + | |Humint|Humint is an abbreviation for Human Intelligence; |
- | | Polymorphism | Polymorphism is the process by which malicious software changes its underlying code to avoid detection.| | + | |Hybrid Attack|A Hybrid Attack builds on the dictionary attack method by adding numerals and symbols to dictionary words.| |
- | | POP3 (Post Office Protocol Version 3) | An Internet Standard protocol by which a client workstation can dynamically access a mailbox on a server host to retrieve mail messages that the server has received and is holding for the client.| | + | |Hybrid Encryption|An application of cryptography that combines two or more encryption algorithms, particularly a combination of symmetric and asymmetric encryption.| |
- | | Port | A port is nothing more than an integer that uniquely identifies an endpoint of a communication stream. | + | |Hyperlink|In hypertext or hypermedia, an information object (such as a word, a phrase, or an image; usually highlighted by color or underscoring) that points (indicates how to connect) to related information that is located elsewhere and can be retrieved by activating the link.| |
- | | Port Scan | A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services, each associated with a " | + | |Hypertext Markup Language|HTML. |
- | | Possession | Possession is the holding, control, and ability to use information.| | + | |Hypertext Transfer Protocol|HTTP. |
- | | Post Office Protocol Version 3 (POP3) | An Internet Standard protocol by which a client workstation can dynamically access a mailbox on a server host to retrieve mail messages that the server has received and is holding for the client.| | + | |ICMP|Internet Control Message Protocol.| |
- | | PPP (Point-to-Point) | A protocol for communication between two computers using a serial interface, typically a personal computer connected by phone line to a server. | + | |:::|An Internet Standard protocol that is used to report error conditions during IP datagram processing and to exchange other information concerning the state of the IP network.| |
- | | Practical Extraction and Reporting Language (PERL) | A script programming language that is similar in syntax to the C language and that includes a number of popular Unix facilities such as sed, awk, and tr.| | + | |Identity | Identity is whom someone or what something is, for example, the name by which something is known.| |
- | | Preamble | A preamble is a signal used in network communications to synchronize the transmission timing between two or more systems. | + | |IETF|Internet Engineering Task Force.| |
- | | Pretty Good Privacy | + | |:::|The body that defines standard Internet operating protocols such as TCP/ |
- | | Private Addressing | IANA has set aside three address ranges for use by private or non-Internet connected networks. | + | |IMAP|Internet Message Access Protocol.| |
- | | Program Infector | A program infector is a piece of malware that attaches itself to existing program files.| | + | |:::|A protocol that defines how a client should fetch mail from and return mail to a mail server. |
- | | Program Policy | A program policy is a high-level policy that sets the overall tone of an organization' | + | |Incident|An incident as an adverse network event in an information system or network or the threat of the occurrence of such an event.| |
- | | Promiscuous Mode | When a machine reads all packets off the network, regardless of who they are addressed to. This is used by network administrators to diagnose network problems, but also by unsavoury | + | |Incident Handling|Incident Handling is an action plan for dealing with intrusions, cyber-theft, |
- | | Proof of Concept | + | |Incremental Backups|Incremental backups only backup the files that have been modified since the last backup. |
- | | Proprietary Information | Proprietary information is that information unique to a company and its ability to compete, such as customer lists, technical data, product costs, and trade secrets.| | + | |Industrial Espionage|Espionage is the use of illegal means (spying) to collect Information, |
- | | Protocol | A formal specification for communicating; | + | |INETD|Inetd (or Internet Daemon) is an application that controls smaller internet services like telnet, ftp, and POP.| |
- | | Protocol Stacks | OSI. A set of network protocol layers that work together.| | + | |Inference Attack|Inference Attacks rely on the user to make logical connections between seemingly unrelated pieces of information.| |
- | | Proxy Server | A server that acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control, and caching service. | + | |Information Warfare|Information Warfare is the competition between offensive and defensive players over information resources.| |
- | | Public Key | The publicly-disclosed component of a pair of cryptographic keys used for asymmetric cryptography.| | + | |Ingress Filtering|Ingress Filtering is filtering inbound traffic.| |
- | | Public Key Encryption | The popular synonym for " | + | |Input Validations Attack|Input Validations Attacks are where an attacker intentionally sends unusual input in the hopes of confusing an application.| |
- | | Public Key Infrastructure | + | |Integrity | Integrity is the need to ensure that information has not been changed accidentally or deliberately, |
- | | Public Key Forward Secrecy | + | |Integrity Star Property|In Integrity Star Property a user cannot read data of a lower integrity level then their own.| |
- | | QAZ | A network worm.| | + | |Intellectual Property|Intellectual Property refers to the definition and recording of a novel device, product, process or technique so that it may be bought, sold or legally protected. |
- | | Race Condition | A race condition exploits the small window of time between a security control being applied and when the service is used.| | + | |Intelligence|Intelligence is high-level, processed, exploitable Information.| |
- | | Radiation Monitoring | Radiation monitoring is the process of receiving images, data, or audio from an unprotected source by listening to radiation signals.| | + | |International Organization for Standardization (ISO)|A voluntary, non-treaty, non-government organization, |
- | | RapidShare | RapidShare is one of the world’s largest file-hosting sites; upon uploading, the user is supplied with a unique download URL which enables anyone with whom the uploader shares the URL to download the file. No user is allowed to search the server for content.| | + | |International Telecommunications Union|ITU-T.| |
- | | Reconnaissance | Reconnaissance is the phase of an attack where an attackers finds new systems, maps out networks, and probes for specific, exploitable vulnerabilities.| | + | |:::|Telecommunication Standardization Sector (formerly " |
- | | Reflexive ACLS | CISCO. | + | |Internet|A term to describe connecting multiple separate networks together.| |
- | | Registry | The Registry in Windows operating systems in the central set of settings and information required to run the Windows computer.| | + | |Internet Control Message Protocol|ICMP.| |
- | | Regression Analysis | The use of scripted tests which are used to test software for all possible input is should expect. | + | |:::|An Internet Standard protocol that is used to report error conditions during IP datagram processing and to exchange other information concerning the state of the IP network.| |
- | | Regression Testing | The use of scripted tests which are used to test software for all possible input it should expect. | + | |Internet Engineering Task Force|IETF.| |
- | | Request for Comment | + | |:::|The body that defines standard Internet operating protocols such as TCP/ |
- | | Resource Exhaustion | Resource exhaustion attacks involve tying up finite resources on a system, making them unavailable to others.| | + | |Internet Message Access Protocol|IMAP.| |
- | | Response | A response is information sent that is responding to some stimulus.| | + | |:::|A protocol that defines how a client should fetch mail from and return mail to a mail server. |
- | | Reverse Address Resolution Protocol | + | |Internet Protocol|IP.| |
- | | Reverse Engineering | Acquiring sensitive data by disassembling and analyzing the design of a system component.| | + | |:::|The method or protocol by which data is sent from one computer to another on the Internet.| |
- | | Reverse Lookup | Find out the hostname that corresponds to a particular IP address. | + | |Internet Protocol Security|IPSEC.| |
- | | Reverse Proxy | Reverse proxies take public HTTP requests and pass them to back-end webservers to send the content to it, so the proxy can then send the content to the end-user.| | + | |:::|A developing standard for security at the network or packet processing layer of network communication.| |
- | | Risk | Risk is the product of the level of threat with the level of vulnerability. It establishes the likelihood of a successful attack.| | + | |Internet Relay Chat|IRC.| |
- | | Risk Assessment | A Risk Assessment is the process by which risks are identified and the impact of those risks determined.| | + | |:::|Internet Relay Chat (IRC) is a huge, multi-user live chat facility. |
- | | Risk Averse | Avoiding risk even if this leads to the loss of opportunity. For example, using a (more expensive) phone call vs. sending an e-mail in order to avoid risks associated with e-mail may be considered "Risk Averse" | + | |Internet Service Provider|ISP.| |
- | | Rivest-Shamir-Adleman | + | |:::|An Internet Service Provider (ISP) is a company selling access to the Internet.| |
- | | Role Based Access Control (RBAC) | Role based access control assigns users to roles based on their organizational functions and determines authorization based on those roles.| | + | |Internet Standard|A specification, |
- | | Root | Root is the name of the administrator account in Unix systems.| | + | |Interrupt|An Interrupt is a signal that informs the OS that something has occurred.| |
- | | Rootkit | A collection of tools (programs) that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network.| | + | |Intranet|A computer network, especially one based on Internet technology, that an organization uses for its own internal, and usually private, purposes and that is closed to outsiders.| |
- | | Router | Routers interconnect logical networks by forwarding information to other networks based upon IP addresses.| | + | |Intrusion Detection|A security management system for computers and networks. |
- | | Routing Information Protocol | + | |Invisible Web|Invisible Web is that portion (estimated to be between 60 and 80 per cent) of total Web content that consists of material that is not accessible by standard Search engines. |
- | | Routing Loop | A routing loop is where two or more poorly configured routers repeatedly exchange the same packet over and over.| | + | |IP|Internet Protocol).| |
- | | RPC Scans | RPC scans determine which RPC services are running on a machine.| | + | |:::|The method or protocol by which data is sent from one computer to another on the Internet.| |
- | | RSS (Really Simple Syndication) | RSS is a family of web feed formats used to publish frequently updated works such as blog entries, news headlines, audio, and video in a standardised format. | + | |IP Address|A computer' |
- | | Rule Set Based Access Control | + | |IP Flood|A denial of service attack that sends a host more echo request (" |
- | | S/KEY | A security mechanism that uses a cryptographic hash function to generate a sequence of 64-bit, one-time passwords for remote user login. | + | |IP Forwarding|IP forwarding is an Operating System option that allows a host to act as a router. |
- | | Safety | Safety is the need to ensure that the people involved with the company, including employees, customers, and visitors, are protected from harm.| | + | |IPSEC|Internet Protocol Security).| |
- | | Salt | In cryptography, | + | |:::|A developing standard for security at the network or packet processing layer of network communication.| |
- | | Scareware | Scareware is scam software sold to consumers using social engineering to cause shock, anxiety or the perception of a threat. | + | |IP Spoofing|The technique of supplying a false IP address.| |
- | | Scavenging | Searching through data residue in a system to gain unauthorized knowledge of sensitive data.| | + | |IRC|Internet Relay Chat (IRC) is a huge, multi-user live chat facility. |
- | | Secure Electronic Transactions | + | |IRM|Information Risk Management.| |
- | | Secure Shell (SSH) | A program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another.| | + | |ISO|International Organization for Standardization).| |
- | | Secure Sockets Layer (SSL) | A protocol developed by Netscape for transmitting private documents via the Internet. | + | |:::|A voluntary, non-treaty, non-government organization, |
- | | Security Policy | A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources.| | + | |ISP|Internet Service Provider).| |
- | | Segment | Segment is another name for TCP packets.| | + | |:::|An Internet Service Provider (ISP) is a company selling access to the Internet.| |
- | | Sensitive Information | Sensitive information, | + | |Issue-specific Policy | An Issue-Specific Policy is intended to address specific needs within an organization, |
- | | Separation of Duties | Separation of duties is the principle of splitting privileges among multiple individuals or systems.| | + | |ITU-T|International Telecommunications Union).| |
- | | Server | A system entity that provides a service in response to requests from other system entities called clients.| | + | |:::|Telecommunication Standardization Sector (formerly " |
- | | Session | A session is a virtual connection between two hosts by which network traffic is passed.| | + | |Jitter|Jitter or Noise is the modification of fields in a database while preserving the aggregate characteristics of that make the database useful in the first place.| |
- | | Session Hijacking | Take over a session that someone else has established.| | + | |Jump Bag|A Jump Bag is a container that has all the items necessary to respond to an incident inside to help mitigate the effects of delayed reactions.| |
- | | Session Key | In the context of symmetric encryption, a key that is temporary or is used for a relatively short period of time. Usually, a session key is used for a defined period of communication between two computers, such as for the duration of a single connection or transaction set, or the key is used in an application that protects relatively large amounts of data and, therefore, needs to be re-keyed frequently.| | + | |Kerberos|A system developed at the Massachusetts Institute of Technology that depends on passwords and symmetric cryptography (DES) to implement ticket-based, |
- | | SET (Secure Electronic Transactions) | Secure Electronic Transactions is a protocol developed for credit card transactions in which all parties (customers, merchant, and bank) are authenticated using digital signatures, encryption protects the message and provides integrity, and provides end-to-end security for credit card transactions online.| | + | |Kernel|The essential centre of a computer operating system, the core that provides basic services for all other parts of the operating system. |
- | | SHA1 | A one way cryptographic hash function. Also see " | + | |KYC|Know Your Customer.| |
- | | Shadow Password Files | A system file in which encryption user password are stored so that they aren't available to people who try to break into the system.| | + | |L2F|Layer 2 Forwarding Protocol).| |
- | | Share | A share is a resource made public on a machine, such as a directory (file share) or printer (printer share).| | + | |:::|An Internet protocol (originally developed by Cisco Corporation) that uses tunnelling of PPP over IP to create a virtual extension of a dial-up link across a network, initiated by the dial-up server and transparent to the dial-up user.| |
- | | Shell | A Unix term for the interactive user interface with an operating system. The shell is the layer of programming that understands and executes the commands a user enters. In some systems, the shell is called a command interpreter. A shell usually implies an interface with a command syntax (think of the DOS operating system and its " | + | |L2FP|Layer 2 Tunneling |
- | | Signals Analysis | Gaining indirect knowledge of communicated data by monitoring and analyzing a signal that is emitted by a system and that contains the data but is not intended to communicate the data.| | + | |:::|An extension of the Point-to-Point |
- | | Signature | A Signature is a distinct pattern in network traffic that can be identified to a specific tool or exploit.| | + | |Lattice Techniques|Lattice Techniques use security designations to determine access to information.| |
- | | Simple Integrity Property | In Simple Integrity Property a user cannot write data to a higher integrity level than their own.| | + | |Layer 2 Forwarding Protocol|L2F. |
- | | Simple Network Management Protocol | + | |Layer 2 Tunneling |
- | | Simple Security Property | In Simple Security Property a user cannot read data of a higher classification than their own.| | + | |Least Privilege|Least Privilege is the principle of allowing users or applications the least amount of permissions necessary to perform their intended function.| |
- | | Skimming | Skimming is the theft of credit card information using an electronic device called a skimmer to read and store credit card numbers. | + | |Legion|Software to detect unprotected shares.| |
- | | Smartcard | A smartcard is an electronic badge that includes a magnetic strip or chip that can record and replay a set key.| | + | |Lightweight Directory Access Protocol|LDAP. |
- | | Smurf | The Smurf attack works by spoofing the target address and sending a ping to the broadcast address for a remote network, which results in a large amount of ping replies being sent to the target.| | + | |Link State|With link state, routes maintain information about all routers and router-to-router links within a geographic area, and creates a table of best routes with that information.| |
- | | Sniffer | A sniffer is a tool that monitors network traffic as it received in a network interface.| | + | |List-based Access Control | List Based Access Control associates a list of users and their privileges with each object.| |
- | | Sniffing | A synonym for " | + | |LKM|Loadable Kernel Modules.| |
- | | SNMP (Simple Network Management Protocol) | The protocol governing network management and the monitoring of network devices and their functions. | + | |:::|Loadable Kernel Modules allow for the adding of additional functionality directly into the kernel while the system is running.| |
- | | Social Engineering | A euphemism for non-technical or low-technology means - such as lies, impersonation, | + | |Loadable Kernel Modules|LKM. |
- | | Socket | The socket tells a host's IP stack where to plug in a data stream so that it connects to the right application.| | + | |Log Clipping|Log clipping is the selective removal of log entries from a system log to hide a compromise.| |
- | | Socket Pair | A way to uniquely specify a connection, i.e., source IP address, source port, destination IP address, destination port.| | + | |Logic Bombs|Logic bombs are programs or snippets of code that execute when a certain predefined event occurs. |
- | | Socks | A protocol that a proxy server can use to accept requests from client users in a company' | + | |Logic Gate|A logic gate is an elementary building block of a digital circuit. |
- | | Software | Computer programs (which are stored in and executed by computer hardware) and associated data (which also is stored in the hardware) that may be dynamically written or modified during execution.| | + | |Loopback Address | The loopback address (127.0.0.1) is a pseudo IP address that always refer back to the local host and are never sent out onto a network.| |
- | | Source Port | The port that a host uses to connect to a server. It is usually a number greater than or equal to 1024. It is randomly generated and is different each time a connection is made.| | + | |LTR|Large Transaction Report.| |
- | | Spam | Electronic junk mail or junk newsgroup postings.| | + | |MAC|Mandatory Access Control).| |
- | | Spanning Port | Configures the switch to behave like a hub for a specific port.| | + | |:::|Mandatory Access Control controls is where the system controls access to resources based on classification levels assigned to both the objects and the users. |
- | | Spear-phishing | Spear-phishing is a targeted form of phishing that focuses on a single user or department within an organisation, | + | |MAC Address|A physical address; a numeric value that uniquely identifies that network device from every other device on the planet.| |
- | | Split Horizon | Split horizon is a algorithm for avoiding problems caused by including routes in updates sent to the gateway from which they were learned.| | + | |Malicious Code|Software (e.g., Trojan horse) that appears to perform a useful or desirable function, but actually gains unauthorized access to system resources or tricks a user into executing other malicious logic.| |
- | | Split Key | A cryptographic key that is divided into two or more separate data items that individually convey no knowledge of the whole key that results from combining the items.| | + | |Malware|A generic term for a number of different types of malicious code.| |
- | | Spoof | Attempt by an unauthorized entity to gain access to a system by posing as an authorized user.| | + | |Mandatory Access Control|MAC. |
- | | Spyware | Spyware is any software application that is generally installed without the knowledge or consent of the user, to obtain, use, or interfere with personal information or resources, content, or setting, for malicious or undesirable purposes.| | + | |Man in the Middle Attack|MITM.| |
- | | SQL Injection | + | |:::|In cryptography, |
- | | SSH (Secure Shell) | A program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another.| | + | |Masquerade Attack|A type of attack in which one system entity illegitimately poses as (assumes the identity of) another entity.| |
- | | SSL (Secure Sockets Layer) | A protocol developed by Netscape for transmitting private documents via the Internet. | + | |MD5|A one way cryptographic hash function. |
- | | SSO (System Security Officer) | A person responsible for enforcement or administration of the security policy that applies to the system.| | + | |Measures of Effectiveness|MOE.| |
- | | Stack Mashing | Stack mashing is the technique of using a buffer overflow to trick a computer into executing arbitrary code.| | + | |:::|Measures of Effectiveness is a probability model based on engineering concepts that allows one to approximate the impact a give action will have on an environment. In Information warfare it is the ability to attack or defend within an Internet environment.| |
- | | Standard ACLS | CISCO. | + | |MFT|Managed File Transfer.| |
- | | Star Property | In Star Property, a user cannot write data to a lower classification level without logging in at that lower classification level.| | + | |MI|Management Information.| |
- | | State Machine | A system that moves through a series of progressive conditions.| | + | |MITM Attack|Man in the Middle.| |
- | | Stateful Inspection | Also referred to as dynamic packet filtering. Stateful inspection is a firewall architecture that works at the network layer. | + | |:::|In cryptography, |
- | | Static Host Tables | Static host tables are text files that contain hostname and address mapping.| | + | |MOE|Measures of Effectiveness).| |
- | | Static Routing | Static routing means that routing table entries contain information that does not change.| | + | |:::|Measures of Effectiveness is a probability model based on engineering concepts that allows one to approximate the impact a give action will have on an environment. In Information warfare it is the ability to attack or defend within an Internet environment.| |
- | | Stealthing | Stealthing is a term that refers to approaches used by malicious code to conceal its presence on the infected system.| | + | |Monoculture|Monoculture is the case where a large number of users run the same software, and are vulnerable to the same attacks.| |
- | | Steganalysis | Steganalysis is the process of detecting and defeating the use of steganography.| | + | |Morris Worm|A worm program written by Robert T. Morris, Jr. that flooded the ARPANET in November, 1988, causing problems for thousands of hosts.| |
- | | Steganography | Methods of hiding the existence of a message or other data. This is different than cryptography, | + | |MoSCoW | Must, Should, Could, Would.| |
- | | Stimulus | Stimulus is network traffic that initiates a connection or solicits a response.| | + | |Mule|Also known as a money mule, a mule is an individual who transfers stolen money or merchandise either in person, through a courier service or electronically to help obscure a scammer’s identity and/or location. |
- | | Store-and-Forward | Store-and-Forward is a method of switching where the entire packet is read by a switch to determine if it is intact before forwarding it.| | + | |Multi-Cast|Broadcasting from one host to a given set of hosts.| |
- | | Straight-through-Cable | A straight-through cable is where the pins on one side of the connector are wired to the same pins on the other end. It is used for interconnecting nodes on the network.| | + | |Multi-Homed|You are " |
- | | Stream Cipher | A stream cipher works by encryption a message a single bit, byte, or computer word at a time.| | + | |Multiplexing|To combine multiple signals from possibly disparate sources, in order to transmit them over a single path.| |
- | | Strong Star Property | In Strong Star Property, a user cannot write data to higher or lower classifications levels than their own.| | + | |NAT|Network Address Translation).| |
- | | Sub Network | A separately identifiable part of a larger network that typically represents a certain limited number of host computers, the hosts in a building or geographic area, or the hosts on an individual local area network.| | + | |:::|It is used to share one or a small number of publicly routable IP addresses among a larger number of hosts. |
- | | Subnet Mask | A subnet mask (or number) is used to determine the number of bits used for the subnet and host portions of the address. | + | |National Institute of Standards and Technology|NIST. |
- | | Switch | A switch is a networking device that keeps track of MAC addresses attached to each of its ports so that data is only transmitted on the ports that are the intended recipient of the data.| | + | |Natural Disaster|Any "act of God" (e.g., fire, flood, earthquake, lightning, or wind) that disables a system component.| |
- | | Switched Network | A communications network, such as the public switched telephone network, in which any user may be connected to any other user through the use of message, circuit, or packet switching and control devices. Any network providing switched communications service.| | + | |Netmask|32-bit number indicating the range of IP addresses residing on a single IP network/ |
- | | Symbolic Links | Special files which point at another file.| | + | |Network Address Translation|NAT. |
- | | Symmetric Cryptography | A branch of cryptography involving algorithms that use the same key for two different steps of the algorithm (such as encryption and decryption, or signature creation and signature verification). | + | |Network-based IDS|A network-based IDS system monitors the traffic on its network segment as a data source. |
- | | Symmetric Key | A cryptographic key that is used in a symmetric cryptographic algorithm.| | + | |Network Mapping|To compile an electronic inventory of the systems and the services on your network.| |
- | | SYN Flood | A denial of service attack that sends a host more TCP SYN packets (request to synchronize sequence numbers, used when opening a connection) than the protocol implementation can handle.| | + | |Network Taps|Network taps are hardware devices that hook directly onto the network cable and send a copy of the traffic that passes through it to one or more other networked devices.| |
- | | Synchronization | Synchronization is the signal made up of a distinctive pattern of bits that network hardware looks for to signal that start of a frame.| | + | |Newsgroup|Newsgroup is the name for a discussion group or chat room.| |
- | | Syslog | Syslog is the system logging facility for Unix systems.| | + | |Nginx|Nginx Web Server. |
- | | System Security Officer (SSO) | A person responsible for enforcement or administration of the security policy that applies to the system.| | + | |Node|Node is any single device connected to a Network.| |
- | | System-specific Policy | A System-specific policy is a policy written for a specific system or device.| | + | |Non FCT|Non Functional Testing. |
- | | T1, T3 | A digital circuit using TDM (Time-Division Multiplexing).| | + | |Non-printable character|A character that doesn' |
- | | Tamper | To deliberately alter a system' | + | |Non-repudiation|Non-repudiation is the ability for a system to prove that a specific user and only that specific user sent a message and that it hasn't been modified.| |
- | | TCP (Transmission Control Protocol) | A set of rules (protocol) used along with the Internet Protocol to send data in the form of message units between computers over the Internet. | + | |Null Session|Known as Anonymous Logon, it is a way of letting an anonymous user retrieve information such as user names and shares over the network or connect without authentication. It is used by applications such as explorer.exe to enumerate shares on remote servers.| |
- | | TCP Fingerprinting | TCP fingerprinting is the user of odd packet header combinations to determine a remote operating system.| | + | |OAT|Operational Acceptance Testing. |
- | | TCP Full Open Scan | TCP Full Open scans check each port by performing a full three-way handshake on each port to determine if it was open.| | + | |Octet|A sequence of eight bits. An octet is an eight-bit byte.| |
- | | TCP Half Open Scan | TCP Half Open scans work by performing the first half of a three-way handshake to determine if a port is open.| | + | |One-way Encryption|Irreversible transformation of plain-text to cipher text, such that the plain-text cannot be recovered from the cipher text by other than exhaustive procedures even if the cryptographic key is known.| |
- | | TCP Wrapper | A software package which can be used to restrict access to certain network services based on the source of the connection; a simple tool to monitor and control incoming network traffic.| | + | |One-way Function |A (mathematical) function, f, which is easy to compute the output based on a given input. |
- | | TCP/IP | A synonym for " | + | |Open Shortest Path First|(OSPF) Open Shortest Path First is a link state routing algorithm used in interior gateway routing. Routers maintain a database of all routers in the autonomous system with links between the routers, link costs, and link states (up and down).| |
- | | TCPDump | TCPDump is a freeware protocol analyzer for Unix that can monitor network traffic on a wire.| | + | |Open Source Information |Open source information is unclassified published information. |
- | | Technical Vulnerability Assessment (TVA) | A Technical Vulnerability Assessment is a key component of an organization’s Risk Assessment and Risk Management programs.| | + | |Open Systems Interconnection|OSI is a standard description or " |
- | | Telnet | A TCP-based, application-layer, | + | |OR|Operational Risk.| |
- | | Threat | A potential for violation of security, which exists when there is a circumstance, | + | |ORF|Operational Risk Framework.| |
- | | Threat Assessment | A threat assessment is the identification of types of threats that an organization might be exposed to.| | + | |ORIA|Operational Risk Impact Assessment. |
- | | Threat Model | A threat model is used to describe a given threat and the harm it could to do a system if it has a vulnerability.| | + | |OSI|Open Systems Interconnection.| |
- | | Threat Vector | The method a threat uses to get to the target.| | + | |:::|OSI is a standard description or " |
- | | Time to Live | A value in an Internet Protocol packet that tells a network router whether or not the packet has been in the network too long and should be discarded.| | + | |OSI Layers|The main idea in OSI is that the process of communication between two end points in a telecommunication network can be divided into layers, with each layer adding its own set of special, related functions. |
- | | Tiny Fragment Attack | With many IP implementations it is possible to impose an unusually small fragment size on outgoing packets. | + | |OSPF| Open Shortest Path First is a link state routing algorithm used in interior gateway routing. Routers maintain a database of all routers in the autonomous system with links between the routers, link costs, and link states (up and down).| |
- | | TLS (Transport Layer Security) | A protocol that ensures privacy between communicating applications and their users on the Internet. | + | |Overload|Hindrance of system operation by placing excess burden on the performance capabilities of a system component.| |
- | | Token Ring | A token ring network is a local area network in which all computers are connected in a ring or star topology and a binary digit or token-passing scheme is used in order to prevent the collision of data between two computers that want to send messages at the same time.| | + | |Packet|A piece of a message transmitted over a packet-switching network. One of the key features of a packet is that it contains the destination address in addition to the data. In IP networks, packets are often called datagrams.| |
- | | Token-based Access Control | Token based access control associates a list of objects and their privileges with each user. (The opposite of list based.)| | + | |Packet Switched Network|A packet switched network is where individual packets each follow their own paths through the network from one endpoint to another.| |
- | | Topology | The geometric arrangement of a computer system. Common topologies include a bus, star, and ring. The specific physical, i.e., real, or logical, i.e., virtual, arrangement of the elements of a network. | + | |PAN|Primary Account Number.| |
- | | Traceroute | Traceroute is a tool the maps the route a packet takes from the local machine to a remote destination.| | + | |Partitions|Major divisions of the total physical hard disk space.| |
- | | Trade Secret | A Trade Secret is Information (including a formula, pattern, compilation, | + | |Password Authentication Protocol|PAP. |
- | | Transmission Control Protocol | + | |Password Cracking|Password cracking is the process of attempting to guess passwords, given the password file information.| |
- | | Transport Layer Security | + | |Password Sniffing|Passive wiretapping, |
- | | Triple DES | A block cipher, based on DES, that transforms each 64-bit plain-text block by applying the Data Encryption Algorithm three successive times, using either two or three different keys, for an effective key length of 112 or 168 bits.| | + | |PATS|Per Application Test Strategy.| |
- | | Triple-wrapped | S/MIME usage: data that has been signed with a digital signature, and then encrypted, and then signed again.| | + | |Patch|A patch is a small update released by a software manufacturer to fix bugs in existing programs.| |
- | | Trojan Horse | A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.| | + | |Patching|Patching is the process of updating software to a different version.| |
- | | Trunking | Trunking is connecting switched together so that they can share VLAN information between them.| | + | |Payload|Payload is the actual application data a packet contains.| |
- | | Trust | Trust determine which permissions and what actions other systems or users can perform on remote machines.| | + | |Penetration|Gaining unauthorized logical access to sensitive data by circumventing a system' |
- | | Trusted Ports | Trusted ports are ports below number 1024 usually allowed to be opened by the root user.| | + | |Penetration Testing|Penetration testing is used to test the external perimeter security of a network or facility.| |
- | | Tunnel | A communication channel created in a computer network by encapsulating a communication protocol' | + | |PERL|Practical Extraction and Reporting Language).| |
- | | TVA (Technical Vulnerability Assessment) | A Technical Vulnerability Assessment is a key component of an organization’s Risk Assessment and Risk Management programs.| | + | |:::|A script programming language that is similar in syntax to the C language and that includes a number of popular Unix facilities such as sed, awk, and tr.| |
- | | UDP (User Datagram Protocol) | A communications protocol that, like TCP, runs on top of IP networks. | + | |Permutation|Permutation keeps the same letters but changes the position within a text to scramble the message.| |
- | | UDP Scan | UDP scans perform scans to determine which UDP ports are open.| | + | |Personal Firewalls|Personal firewalls are those firewalls that are installed and run on individual PCs.| |
- | | Underground Economy | The Underground Economy (sometimes known as black market or black economy) is trade, goods and services that are not part of the official economy of a country; this may be legal activities where taxes are not paid, or illegal activities, such as drug trafficking, | + | |PFS|Public Key Forward Secrecy.| |
- | | Unicast | Broadcasting from host to host.| | + | |:::|For a key agreement protocol based on asymmetric cryptography, |
- | | Uniform Resource Identifier | + | |Pharming|This is a more sophisticated form of MITM attack. |
- | | Uniform Resource Locator | + | |Phishing|The use of e-mails that appear to originate from a trusted source to trick a user into entering valid credentials at a fake website. |
- | | UNIX | A popular multi-user, multitasking operating system developed at Bell Labs in the early 1970s. | + | |PII|Personal Identifiable Information.| |
- | | Unprotected Share | In Windows terminology, | + | |Ping of Death|An attack that sends an improperly large ICMP echo request packet (a " |
- | | URL (Uniform Resource Locator) | The global address of documents and other resources on the World Wide Web. The first part of the address indicates what protocol to use, and the second part specifies the IP address or the domain name where the resource is located. | + | |Ping Scan|A ping scan looks for machines that are responding to ICMP Echo Requests.| |
- | | User | A person, organization entity, or automated process that accesses a system, whether authorized to do so or not.| | + | |Ping Sweep|An attack that sends ICMP echo requests (" |
- | | User Contingency Plan | User contingency plan is the alternative methods of continuing business operations if IT systems are unavailable.| | + | |PIR|Post Incident Review.| |
- | | User Datagram Protocol | + | |PGP|Pretty Good Privacy).| |
- | | Usenet | Usenet is an outdated term for a worldwide system of discussion groups, with comments passed among hundreds or thousands of machines. | + | |:::|Trademark of Network Associates, Inc., referring to a computer program (and related protocols) that uses cryptography to provide data security for electronic mail and other applications on the Internet.| |
- | | Virtual Private Network | + | |PKI|A PKI (public key infrastructure) enables users of a basically unsecured public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. |
- | | Virus | A hidden, self-replicating section of computer software, usually malicious logic, that propagates by infecting - i.e., inserting a copy of itself into and becoming part of - another program. A virus cannot run by itself; it requires that its host program be run to make the virus active.| | + | |Plaintext|Ordinary readable text before being encrypted into ciphertext or after being decrypted.| |
- | | Voice Firewall | A physical discontinuity in a voice network that monitors, alerts and controls inbound and outbound voice network activity based on user-defined call admission control (CAC) policies, voice application layer security threats or unauthorized service use violations.| | + | |PMI|Potential Major Incident.| |
- | | Voice Intrusion Prevention System | + | |PoC|Proof of Concept).| |
- | | VPN (Virtual Private Network) | A restricted-use, | + | |:::|A proof of concept is realisation of a certain method or idea to demonstrate its feasibility, |
- | | W3 (World Wide Web) | The global, hypermedia-based collection of information (including text, audio, video, and graphics) and services that is available on Internet servers and is accessed by browsers using Hypertext Transfer Protocol and other information retrieval mechanisms.| | + | |POC|Point of Contact.| |
- | | W3C (World Wide Web Consortium) | The W3C is an international organization that develops Web standards.| | + | |Point-to-Point|PPP.| |
- | | War Chalking | War chalking is marking areas, usually on sidewalks with chalk, that receive wireless signals that can be accessed.| | + | |:::|A protocol for communication between two computers using a serial interface, typically a personal computer connected by phone line to a server. |
- | | War Dialer | A computer program that automatically dials a series of telephone numbers to find lines connected to computer systems, and catalogues those numbers so that a cracker can try to break into the systems.| | + | |Point-to-Point |
- | | War Dialing | War dialing is a simple means of trying to identify modems in a telephone exchange that may be susceptible to compromise in an attempt to circumvent perimeter security.| | + | |Poison Reverse|Split horizon with poisoned reverse (more simply, poison reverse) does include such routes in updates, but sets their metrics to infinity. In effect, advertising the fact that there routes are not reachable.| |
- | | Warez | Warez refers primarily to copyrighted works distributed without fees or royalties, and may be traded, in general violation of copyright law. The term generally refers to unauthorized releases by organized groups, as opposed to file sharing between friends.| | + | |Polyinstantiation|Polyinstantiation is the ability of a database to maintain multiple records with the same key. It is used to prevent inference attacks.| |
- | | Warm Disaster Recovery Site | It contains partially redundant hardware and software, with telecommunications, | + | |Polymorphism|Polymorphism is the process by which malicious software changes its underlying code to avoid detection.| |
- | | War Driving | War driving is the process of travelling around looking for wireless access point signals that can be used to get network access.| | + | |POP3|Post Office Protocol Version 3).| |
- | | Web 2.0 | Web 2.0 currently lacks a precise definition. | + | |:::|An Internet Standard protocol by which a client workstation can dynamically access a mailbox on a server host to retrieve mail messages that the server has received and is holding for the client.| |
- | | Web of Trust | A web of trust is the trust that naturally evolves as a user starts to trust others' | + | |Port|A port is nothing more than an integer that uniquely identifies an endpoint of a communication stream. |
- | | Web Server | A software process that runs on a host computer connected to the Internet to respond to HTTP requests for documents from client web browsers.| | + | |Port Scan|A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services, each associated with a " |
- | | WEP (Wired Equivalent Privacy) | A security protocol for wireless local area networks defined in the standard IEEE 802.11b.| | + | |Possession|Possession is the holding, control, and ability to use information.| |
- | | WHOIS | An IP for finding information about resources on networks.| | + | |Post Office Protocol Version 3|POP3.| |
- | | Wiki | Wiki (from the Hawaiian word for quickly) is a medium for collaboration that allows many people to participate in the production of a long-term knowledge repository or database, often devoted to a specific subject or field of interest. | + | |:::|An Internet Standard protocol by which a client workstation can dynamically access a mailbox on a server host to retrieve mail messages that the server has received and is holding for the client.| |
- | | Windowing | A windowing system is a system for sharing a computer' | + | |PPP|(Point-to-Point).| |
- | | Windump | Windump is a freeware tool for Windows that is a protocol analyzer that can monitor network traffic on a wire.| | + | |:::|A protocol for communication between two computers using a serial interface, typically a personal computer connected by phone line to a server. |
- | | Wired Equivalent Privacy | + | |PR|Problem Record.| |
- | | Wireless Application Protocol | A specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, | + | |Practical Extraction and Reporting Language (PERL) | A script programming language that is similar in syntax to the C language and that includes a number of popular Unix facilities such as sed, awk, and tr.| |
- | | Wiretapping | Monitoring and recording data that is flowing between two points in a communication system.| | + | |Preamble|A preamble is a signal used in network communications to synchronize the transmission timing between two or more systems. |
- | | World Wide Web Consortium | + | |Pretty Good Privacy|PGP.| |
- | | World Wide Web (WWW) | Also known as "THE WEB" or W3).| | + | |:::|Trademark of Network Associates, Inc., referring to a computer program (and related protocols) that uses cryptography to provide data security for electronic mail and other applications on the Internet.| |
- | | Worm | A computer program that can run independently, | + | |Private Addressing|IANA has set aside three address ranges for use by private or non-Internet connected networks. |
- | | WWW (World Wide Web) | The global, hypermedia-based collection of information (including text, audio, video, and graphics) and services that is available on Internet servers and is accessed by browsers using Hypertext Transfer Protocol and other information retrieval mechanisms.| | + | |Program Infector|A program infector is a piece of malware that attaches itself to existing program files.| |
- | | Zero Day | The "Day Zero" or "Zero Day" is the day a new vulnerability is made known. | + | |Program Policy|A program policy is a high-level policy that sets the overall tone of an organization' |
- | | Zero-day Attack | A zero-day (or zero-hour or day zero) attack or threat is a computer threat that tries to exploit computer application vulnerabilities that are unknown to others or undisclosed to the software developer. | + | |Promiscuous Mode|When a machine reads all packets off the network, regardless of who they are addressed to. This is used by network administrators to diagnose network problems, but also by unsavory |
- | | Zombies | A zombie computer (often shortened as zombie) is a computer connected to the Internet that has been compromised by a hacker, a computer virus, or a trojan horse. | + | |Proof of Concept|PoC.| |
+ | |:::|A proof of concept is realization | ||
+ | |Proprietary Information|Proprietary information is that information unique to a company and its ability to compete, such as customer lists, technical data, product costs, and trade secrets.| | ||
+ | |Protocol|A formal specification for communicating; | ||
+ | |Protocol Stacks|OSI. | ||
+ | |Proxy Server|A server that acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control, and caching service. | ||
+ | |PT|Performance Testing.| | ||
+ | |Public Key|The publicly-disclosed component of a pair of cryptographic keys used for asymmetric cryptography.| | ||
+ | |Public Key Encryption|The popular synonym for " | ||
+ | |Public Key Infrastructure|PKI.| | ||
+ | |:::|A PKI (public key infrastructure) enables users of a basically unsecured public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. | ||
+ | |Public Key Forward Secrecy|PFS.| | ||
+ | |:::|For a key agreement protocol based on asymmetric cryptography, | ||
+ | |PWR|Product Work Request.| | ||
+ | |QAZ|A network worm.| | ||
+ | |Race Condition | A race condition exploits the small window of time between a security control being applied and when the service is used.| | ||
+ | |Radiation Monitoring | Radiation monitoring is the process of receiving images, data, or audio from an unprotected source by listening to radiation signals.| | ||
+ | |RAID|Redundant Array of Independent Disks.| | ||
+ | |RapidShare|RapidShare is one of the world’s largest file-hosting sites; upon uploading, the user is supplied with a unique download URL which enables anyone with whom the uploader shares the URL to download the file. No user is allowed to search the server for content.| | ||
+ | |RC|Root Cause.| | ||
+ | |Reconnaissance|Reconnaissance is the phase of an attack where an attackers finds new systems, maps out networks, and probes for specific, exploitable vulnerabilities.| | ||
+ | |RED|Random Early Detection.| | ||
+ | |Reflexive ACLS|CISCO. | ||
+ | |Registry|The Registry in Windows operating systems in the central set of settings and information required to run the Windows computer.| | ||
+ | |Regression Analysis|The use of scripted tests which are used to test software for all possible input is should expect. | ||
+ | |Regression Testing|The use of scripted tests which are used to test software for all possible input it should expect. | ||
+ | |Request for Comment|RFC.| | ||
+ | |:::|A series of notes about the Internet, started in 1969 (when the Internet was the ARPANET). | ||
+ | |Resource Exhaustion|Resource exhaustion attacks involve tying up finite resources on a system, making them unavailable to others.| | ||
+ | |Response|A response is information sent that is responding to some stimulus.| | ||
+ | |Reverse Address Resolution Protocol|RARP.| | ||
+ | |:::|RARP (Reverse Address Resolution Protocol) is a protocol by which a physical machine in a local area network can request to learn its IP address from a gateway server' | ||
+ | |Reverse Engineering|Acquiring sensitive data by disassembling and analyzing the design of a system component.| | ||
+ | |Reverse Lookup|Find out the hostname that corresponds to a particular IP address. | ||
+ | |Reverse Proxy|Reverse proxies take public HTTP requests and pass them to back-end webservers to send the content to it, so the proxy can then send the content to the end-user.| | ||
+ | |RFI|Request for Information.| | ||
+ | |RHEL|Redhat Enterprise Linux.| | ||
+ | |Risk|Risk is the product of the level of threat with the level of vulnerability. It establishes the likelihood of a successful attack.| | ||
+ | |Risk Assessment|A Risk Assessment is the process by which risks are identified and the impact of those risks determined.| | ||
+ | |Risk Averse|Avoiding risk even if this leads to the loss of opportunity. For example, using a (more expensive) phone call vs. sending an e-mail in order to avoid risks associated with e-mail may be considered "Risk Averse" | ||
+ | |Rivest-Shamir-Adleman|RSA.| | ||
+ | |:::|An algorithm for asymmetric cryptography, | ||
+ | |Role Based Access Control (RBAC) | Role based access control assigns users to roles based on their organizational functions and determines authorization based on those roles.| | ||
+ | |ROM|Rough Order of Magnitude.| | ||
+ | |Root|Root is the name of the administrator account in Unix systems.| | ||
+ | |Rootkit|A collection of tools (programs) that a hacker uses to mask intrusion and obtain administrator-level access to a computer or computer network.| | ||
+ | |Router|Routers interconnect logical networks by forwarding information to other networks based upon IP addresses.| | ||
+ | |Routing Information Protocol|RIP.| | ||
+ | |:::|Routing Information Protocol is a distance vector protocol used for interior gateway routing which uses hop count as the sole metric of a path's cost.| | ||
+ | |Routing Loop|A routing loop is where two or more poorly configured routers repeatedly exchange the same packet over and over.| | ||
+ | |RPA|Robotics Process Automation.| | ||
+ | |RPC Scans|RPC scans determine which RPC services are running on a machine.| | ||
+ | |RSS|Really Simple Syndication.| | ||
+ | |:::|RSS is a family of web feed formats used to publish frequently updated works such as blog entries, news headlines, audio, and video in a standardised format. | ||
+ | |RTM|Requirements Traceability Matrix. | ||
+ | |RTQ|Risk Tolerance Questionnaire.| | ||
+ | |Rule Set Based Access Control|RSBAC.| | ||
+ | |:::|Rule Set Based Access Control targets actions based on rules for entities operating on objects.| | ||
+ | |S/KEY|A security mechanism that uses a cryptographic hash function to generate a sequence of 64-bit, one-time passwords for remote user login. | ||
+ | |Safety|Safety is the need to ensure that the people involved with the company, including employees, customers, and visitors, are protected from harm.| | ||
+ | |Salt|In cryptography, | ||
+ | |SAM|Software Asset Management.| | ||
+ | |SAN|Storage Area Network.| | ||
+ | |SBI|Standard Batch Interface.| | ||
+ | |Scareware|Scareware is scam software sold to consumers using social engineering to cause shock, anxiety or the perception of a threat. | ||
+ | |Scavenging|Searching through data residue in a system to gain unauthorized knowledge of sensitive data.| | ||
+ | |Secure Electronic Transactions|SET.| | ||
+ | |:::|Secure Electronic Transactions is a protocol developed for credit card transactions in which all parties (customers, merchant, and bank) are authenticated using digital signatures, encryption protects the message and provides integrity, and provides end-to-end security for credit card transactions online.| | ||
+ | |Secure Shell|SSH.| | ||
+ | |:::|A program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another.| | ||
+ | |Secure Sockets Layer|SSL.| | ||
+ | |:::|A protocol developed by Netscape for transmitting private documents via the Internet. | ||
+ | |Security Policy|A set of rules and practices that specify or regulate how a system or organization provides security services to protect sensitive and critical system resources.| | ||
+ | |Segment|Segment is another name for TCP packets.| | ||
+ | |Sensitive Information|Sensitive information, | ||
+ | |Separation of Duties|Separation of duties is the principle of splitting privileges among multiple individuals or systems.| | ||
+ | |Server|A system entity that provides a service in response to requests from other system entities called clients.| | ||
+ | |Session|A session is a virtual connection between two hosts by which network traffic is passed.| | ||
+ | |Session Hijacking|Take over a session that someone else has established.| | ||
+ | |Session Key|In the context of symmetric encryption, a key that is temporary or is used for a relatively short period of time. Usually, a session key is used for a defined period of communication between two computers, such as for the duration of a single connection or transaction set, or the key is used in an application that protects relatively large amounts of data and, therefore, needs to be re-keyed frequently.| | ||
+ | |SET|Secure Electronic Transactions).| | ||
+ | |:::|Secure Electronic Transactions is a protocol developed for credit card transactions in which all parties (customers, merchant, and bank) are authenticated using digital signatures, encryption protects the message and provides integrity, and provides end-to-end security for credit card transactions online.| | ||
+ | |SFTP|Secure File Transfer Protocol.| | ||
+ | |SHA1|A one way cryptographic hash function. Also see " | ||
+ | |Shadow Password Files | A system file in which encryption user password are stored so that they aren't available to people who try to break into the system.| | ||
+ | |Share|A share is a resource made public on a machine, such as a directory (file share) or printer (printer share).| | ||
+ | |Shell|A Unix term for the interactive user interface with an operating system. The shell is the layer of programming that understands and executes the commands a user enters. In some systems, the shell is called a command interpreter. A shell usually implies an interface with a command syntax (think of the DOS operating system and its " | ||
+ | |Signals Analysis|Gaining indirect knowledge of communicated data by monitoring and analyzing a signal that is emitted by a system and that contains the data but is not intended to communicate the data.| | ||
+ | |Signature|A Signature is a distinct pattern in network traffic that can be identified to a specific tool or exploit.| | ||
+ | |Simple Integrity Property|In Simple Integrity Property a user cannot write data to a higher integrity level than their own.| | ||
+ | |Simple Network Management Protocol|SNMP.| | ||
+ | |:::|The protocol governing network management and the monitoring of network devices and their functions. | ||
+ | |Simple Security Property|In Simple Security Property a user cannot read data of a higher classification than their own.| | ||
+ | |SIT|System Integration Testing. | ||
+ | |Skimming|Skimming is the theft of credit card information using an electronic device called a skimmer to read and store credit card numbers. | ||
+ | |SLA|Service Level Agreement.| | ||
+ | |Smartcard|A smartcard is an electronic badge that includes a magnetic strip or chip that can record and replay a set key.| | ||
+ | |SME|Subject Matter Expert.| | ||
+ | |Smurf|The Smurf attack works by spoofing the target address and sending a ping to the broadcast address for a remote network, which results in a large amount of ping replies being sent to the target.| | ||
+ | |Sniffer|A sniffer is a tool that monitors network traffic as it received in a network interface.| | ||
+ | |Sniffing|A synonym for " | ||
+ | |SNMP|Simple Network Management Protocol.| | ||
+ | |:::|The protocol governing network management and the monitoring of network devices and their functions. | ||
+ | |Social Engineering | A euphemism for non-technical or low-technology means - such as lies, impersonation, | ||
+ | |Socket|The socket tells a host's IP stack where to plug in a data stream so that it connects to the right application.| | ||
+ | |Socket Pair|A way to uniquely specify a connection, i.e., source IP address, source port, destination IP address, destination port.| | ||
+ | |Socks|A protocol that a proxy server can use to accept requests from client users in a company' | ||
+ | |SOD|Start-of-Day.| | ||
+ | |Software|Computer programs (which are stored in and executed by computer hardware) and associated data (which also is stored in the hardware) that may be dynamically written or modified during execution.| | ||
+ | |SOM|Supplier Operating Model.| | ||
+ | |Source Port|The port that a host uses to connect to a server. It is usually a number greater than or equal to 1024. It is randomly generated and is different each time a connection is made.| | ||
+ | |Spam|Electronic junk mail or junk newsgroup postings.| | ||
+ | |Spanning Port|Configures the switch to behave like a hub for a specific port.| | ||
+ | |Spear-phishing|Spear-phishing is a targeted form of phishing that focuses on a single user or department within an organisation, | ||
+ | |Split Horizon|Split horizon is a algorithm for avoiding problems caused by including routes in updates sent to the gateway from which they were learned.| | ||
+ | |Split Key |A cryptographic key that is divided into two or more separate data items that individually convey no knowledge of the whole key that results from combining the items.| | ||
+ | |Spoof|Attempt by an unauthorized entity to gain access to a system by posing as an authorized user.| | ||
+ | |Spyware|Spyware is any software application that is generally installed without the knowledge or consent of the user, to obtain, use, or interfere with personal information or resources, content, or setting, for malicious or undesirable purposes.| | ||
+ | |SQL|Structured Query Language.| | ||
+ | |SQLInjection|SQL injection is a type of input validation attack specific to database-driven applications where SQL code is inserted into application queries to manipulate the database.| | ||
+ | |SSH|Secure Shell. | ||
+ | |:::|A program to log into another computer over a network, to execute commands in a remote machine, and to move files from one machine to another.| | ||
+ | |SSL|Secure Sockets Layer.| | ||
+ | |:::|A protocol developed by Netscape for transmitting private documents via the Internet. | ||
+ | |SSO|Single Sign On.| | ||
+ | |SSO|System Security Officer.| | ||
+ | |:::A person responsible for enforcement or administration of the security policy that applies to the system.| | ||
+ | |ST|System Testing. Done just before the UAT. End-to-End testing done by the IT team, to ensure the system can be handed over to the business to test. | ||
+ | |Stack Mashing|Stack mashing is the technique of using a buffer overflow to trick a computer into executing arbitrary code.| | ||
+ | |Standard ACLS|CISCO. | ||
+ | |Star Property|In Star Property, a user cannot write data to a lower classification level without logging in at that lower classification level.| | ||
+ | |State Machine|A system that moves through a series of progressive conditions.| | ||
+ | |Stateful Inspection|Also referred to as dynamic packet filtering. Stateful inspection is a firewall architecture that works at the network layer. | ||
+ | |Static Host Tables|Static host tables are text files that contain hostname and address mapping.| | ||
+ | |Static Routing|Static routing means that routing table entries contain information that does not change.| | ||
+ | |Stealthing|Stealthing is a term that refers to approaches used by malicious code to conceal its presence on the infected system.| | ||
+ | |Steganalysis|Steganalysis is the process of detecting and defeating the use of steganography.| | ||
+ | |Steganography|Methods of hiding the existence of a message or other data. This is different than cryptography, | ||
+ | |Stimulus|Stimulus is network traffic that initiates a connection or solicits a response.| | ||
+ | |Store-and-Forward|Store-and-Forward is a method of switching where the entire packet is read by a switch to determine if it is intact before forwarding it.| | ||
+ | |STP|Straight Through Processing.| | ||
+ | |Straight-through-Cable|A straight-through cable is where the pins on one side of the connector are wired to the same pins on the other end. It is used for interconnecting nodes on the network.| | ||
+ | |Stream Cipher|A stream cipher works by encryption a message a single bit, byte, or computer word at a time.| | ||
+ | |Strong Star Property|In Strong Star Property, a user cannot write data to higher or lower classifications levels than their own.| | ||
+ | |Sub Network|A separately identifiable part of a larger network that typically represents a certain limited number of host computers, the hosts in a building or geographic area, or the hosts on an individual local area network.| | ||
+ | |Subnet Mask|A subnet mask (or number) is used to determine the number of bits used for the subnet and host portions of the address. | ||
+ | |Switch|A switch is a networking device that keeps track of MAC addresses attached to each of its ports so that data is only transmitted on the ports that are the intended recipient of the data.| | ||
+ | |Switched Network|A communications network, such as the public switched telephone network, in which any user may be connected to any other user through the use of message, circuit, or packet switching and control devices. Any network providing switched communications service.| | ||
+ | |Symbolic Links|Special files which point at another file.| | ||
+ | |Symmetric Cryptography|A branch of cryptography involving algorithms that use the same key for two different steps of the algorithm (such as encryption and decryption, or signature creation and signature verification). | ||
+ | |Symmetric Key|A cryptographic key that is used in a symmetric cryptographic algorithm.| | ||
+ | |SYN Flood|A denial of service attack that sends a host more TCP SYN packets (request to synchronize sequence numbers, used when opening a connection) than the protocol implementation can handle.| | ||
+ | |Synchronization|Synchronization is the signal made up of a distinctive pattern of bits that network hardware looks for to signal that start of a frame.| | ||
+ | |Syslog|Syslog is the system logging facility for Unix systems.| | ||
+ | |System Security Officer (SSO) | A person responsible for enforcement or administration of the security policy that applies to the system.| | ||
+ | |System-specific Policy|A System-specific policy is a policy written for a specific system or device.| | ||
+ | |T1, T3|A digital circuit using TDM (Time-Division Multiplexing).| | ||
+ | |Tamper|To deliberately alter a system' | ||
+ | |TBC|To be confirmed.| | ||
+ | |TCP|Transmission Control Protocol.| | ||
+ | |:::|A set of rules (protocol) used along with the Internet Protocol to send data in the form of message units between computers over the Internet. | ||
+ | |TCP Fingerprinting|TCP fingerprinting is the user of odd packet header combinations to determine a remote operating system.| | ||
+ | |TCP Full Open Scan|TCP Full Open scans check each port by performing a full three-way handshake on each port to determine if it was open.| | ||
+ | |TCP Half Open Scan|TCP Half Open scans work by performing the first half of a three-way handshake to determine if a port is open.| | ||
+ | |TCP Wrapper| A software package which can be used to restrict access to certain network services based on the source of the connection; a simple tool to monitor and control incoming network traffic.| | ||
+ | |TCP/IP|A synonym for " | ||
+ | |TCPDump|TCPDump is a freeware protocol analyzer for Unix that can monitor network traffic on a wire.| | ||
+ | |Technical Vulnerability Assessment (TVA) | A Technical Vulnerability Assessment is a key component of an organization’s Risk Assessment and Risk Management programs.| | ||
+ | |Telnet|A TCP-based, application-layer, | ||
+ | |Threat|A potential for violation of security, which exists when there is a circumstance, | ||
+ | |Threat Assessment|A threat assessment is the identification of types of threats that an organization might be exposed to.| | ||
+ | |Threat Model|A threat model is used to describe a given threat and the harm it could to do a system if it has a vulnerability.| | ||
+ | |Threat Vector|The method a threat uses to get to the target.| | ||
+ | |Time to Live|A value in an Internet Protocol packet that tells a network router whether or not the packet has been in the network too long and should be discarded.| | ||
+ | |Tiny Fragment Attack|With many IP implementations it is possible to impose an unusually small fragment size on outgoing packets. | ||
+ | |TLS|Transport Layer Security.| | ||
+ | |:::|A protocol that ensures privacy between communicating applications and their users on the Internet. | ||
+ | |T& | ||
+ | |Token Ring|A token ring network is a local area network in which all computers are connected in a ring or star topology and a binary digit or token-passing scheme is used in order to prevent the collision of data between two computers that want to send messages at the same time.| | ||
+ | |Token-based Access Control | Token based access control associates a list of objects and their privileges with each user. (The opposite of list based.)| | ||
+ | |TOM|Target Operating Model.| | ||
+ | |Topology|The geometric arrangement of a computer system. Common topologies include a bus, star, and ring. The specific physical, i.e., real, or logical, i.e., virtual, arrangement of the elements of a network. | ||
+ | |TOR|Terms of Reference.| | ||
+ | |Traceroute|Traceroute is a tool the maps the route a packet takes from the local machine to a remote destination.| | ||
+ | |Trade Secret|A Trade Secret is Information (including a formula, pattern, compilation, | ||
+ | |Transmission Control Protocol|TCP.| | ||
+ | |:::|A set of rules (protocol) used along with the Internet Protocol to send data in the form of message units between computers over the Internet. | ||
+ | |Transport Layer Security|TLS.| | ||
+ | |:::|A protocol that ensures privacy between communicating applications and their users on the Internet. | ||
+ | |TRB|Test Review Board.| | ||
+ | |Triple DES|A block cipher, based on DES, that transforms each 64-bit plain-text block by applying the Data Encryption Algorithm three successive times, using either two or three different keys, for an effective key length of 112 or 168 bits.| | ||
+ | |Triple-wrapped|S/ | ||
+ | |Trojan Horse|A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.| | ||
+ | |Trunking|Trunking is connecting switched together so that they can share VLAN information between them.| | ||
+ | |Trust|Trust determine which permissions and what actions other systems or users can perform on remote machines.| | ||
+ | |Trusted Ports|Trusted ports are ports below number 1024 usually allowed to be opened by the root user.| | ||
+ | |TSBIA|Technical Service Baseline Impact Assessment.| | ||
+ | |Tunnel|A communication channel created in a computer network by encapsulating a communication protocol' | ||
+ | |TVA|Technical Vulnerability Assessment.| | ||
+ | |:::|A Technical Vulnerability Assessment is a key component of an organization’s Risk Assessment and Risk Management programs.| | ||
+ | |UAT|User Acceptance Testing.| | ||
+ | |UDF|User Defined Field.| | ||
+ | |UDP|User Datagram Protocol| | ||
+ | |:::|A communications protocol that, like TCP, runs on top of IP networks. | ||
+ | |UDP Scan|UDP scans perform scans to determine which UDP ports are open.| | ||
+ | |Underground Economy|The Underground Economy (sometimes known as black market or black economy) is trade, goods and services that are not part of the official economy of a country; this may be legal activities where taxes are not paid, or illegal activities, such as drug trafficking, | ||
+ | |Unicast|Broadcasting from host to host.| | ||
+ | |Uniform Resource Identifier|URI.| | ||
+ | |:::|The generic term for all types of names and addresses that refer to objects on the World Wide Web.| | ||
+ | |Uniform Resource Locator|URL.| | ||
+ | |:::|The global address of documents and other resources on the World Wide Web. The first part of the address indicates what protocol to use, and the second part specifies the IP address or the domain name where the resource is located. | ||
+ | |UNIX|A popular multi-user, multitasking operating system developed at Bell Labs in the early 1970s. | ||
+ | |Unprotected Share|In Windows terminology, | ||
+ | |UPI|Unique Product Identifier.| | ||
+ | |URL|Uniform Resource Locator.| | ||
+ | |:::|The global address of documents and other resources on the World Wide Web. The first part of the address indicates what protocol to use, and the second part specifies the IP address or the domain name where the resource is located. | ||
+ | |User| A person, organization entity, or automated process that accesses a system, whether authorized to do so or not.| | ||
+ | |User Contingency Plan| User contingency plan is the alternative methods of continuing business operations if IT systems are unavailable.| | ||
+ | |User Datagram Protocol|UDP| | ||
+ | |:::|A communications protocol that, like TCP, runs on top of IP networks. | ||
+ | |Usenet|Usenet is an outdated term for a worldwide system of discussion groups, with comments passed among hundreds or thousands of machines. | ||
+ | |VDI|Virtual Desktop Infrastructure.| | ||
+ | |Virtual Private Network|VPN| | ||
+ | |:::|A restricted-use, | ||
+ | |Virus| A hidden, self-replicating section of computer software, usually malicious logic, that propagates by infecting - i.e., inserting a copy of itself into and becoming part of - another program. A virus cannot run by itself; it requires that its host program be run to make the virus active.| | ||
+ | |Voice Firewall|A physical discontinuity in a voice network that monitors, alerts and controls inbound and outbound voice network activity based on user-defined call admission control (CAC) policies, voice application layer security threats or unauthorized service use violations.| | ||
+ | |Voice Intrusion Prevention System|Voice IPS is a security management system for voice networks which monitors voice traffic for multiple calling patterns or attack/ | ||
+ | |VPN|Virtual Private Network.| | ||
+ | |:::|A restricted-use, | ||
+ | |W3|World Wide Web.| | ||
+ | |:::|The global, hypermedia-based collection of information (including text, audio, video, and graphics) and services that is available on Internet servers and is accessed by browsers using Hypertext Transfer Protocol and other information retrieval mechanisms.| | ||
+ | |W3C|World Wide Web Consortium| | ||
+ | |:::|The W3C is an international organization that develops Web standards.| | ||
+ | |WAR|Work Area Recovery.| | ||
+ | |War Chalking|War chalking is marking areas, usually on sidewalks with chalk, that receive wireless signals that can be accessed.| | ||
+ | |War Dialer|A computer program that automatically dials a series of telephone numbers to find lines connected to computer systems, and catalogues those numbers so that a cracker can try to break into the systems.| | ||
+ | |War Dialing|War dialing is a simple means of trying to identify modems in a telephone exchange that may be susceptible to compromise in an attempt to circumvent perimeter security.| | ||
+ | |Warez|Warez refers primarily to copyrighted works distributed without fees or royalties, and may be traded, in general violation of copyright law. The term generally refers to unauthorized releases by organized groups, as opposed to file sharing between friends.| | ||
+ | |Warm Disaster Recovery Site|It contains partially redundant hardware and software, with telecommunications, | ||
+ | |War Driving|War driving is the process of travelling around looking for wireless access point signals that can be used to get network access.| | ||
+ | |Web 2.0|Web 2.0 currently lacks a precise definition. | ||
+ | |Web of Trust|A web of trust is the trust that naturally evolves as a user starts to trust others' | ||
+ | |Web Server|A software process that runs on a host computer connected to the Internet to respond to HTTP requests for documents from client web browsers.| | ||
+ | |WEP|Wired Equivalent Privacy.| | ||
+ | |:::|A security protocol for wireless local area networks defined in the standard IEEE 802.11b.| | ||
+ | |WHOIS|An IP for finding information about resources on networks.| | ||
+ | |Wiki|Wiki (from the Hawaiian word for quickly) is a medium for collaboration that allows many people to participate in the production of a long-term knowledge repository or database, often devoted to a specific subject or field of interest. | ||
+ | |Windowing|A windowing system is a system for sharing a computer' | ||
+ | |Windump|Windump is a freeware tool for Windows that is a protocol analyzer that can monitor network traffic on a wire.| | ||
+ | |Wired Equivalent Privacy|WEP.| | ||
+ | |:::|A security protocol for wireless local area networks defined in the standard IEEE 802.11b.| | ||
+ | |Wireless Application Protocol|A specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, | ||
+ | |Wiretapping|Monitoring and recording data that is flowing between two points in a communication system.| | ||
+ | |World Wide Web Consortium|W3C.| | ||
+ | |:::|The W3C is an international organization that develops Web standards.| | ||
+ | |World Wide Web|WWW.| | ||
+ | |:::|Also known as "THE WEB" or W3.| | ||
+ | |Worm|A computer program that can run independently, | ||
+ | |WWW|World Wide Web.| | ||
+ | |:::|The global, hypermedia-based collection of information (including text, audio, video, and graphics) and services that is available on Internet servers and is accessed by browsers using Hypertext Transfer Protocol and other information retrieval mechanisms.| | ||
+ | |Zero Day|The "Day Zero" or "Zero Day" is the day a new vulnerability is made known. | ||
+ | |Zero-day Attack|A zero-day (or zero-hour or day zero) attack or threat is a computer threat that tries to exploit computer application vulnerabilities that are unknown to others or undisclosed to the software developer. | ||
+ | |Zombies|A zombie computer (often shortened as zombie) is a computer connected to the Internet that has been compromised by a hacker, a computer virus, or a trojan horse. |
glossary/start.1473253100.txt.gz · Last modified: 2020/07/15 09:30 (external edit)