User Tools

Site Tools


glossary:start

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
glossary:start [2023/07/17 15:34] peterglossary:start [2023/07/17 15:57] (current) peter
Line 19: Line 19:
 |ACL|Access Control List.  A list of permissions attached to an object.| |ACL|Access Control List.  A list of permissions attached to an object.|
 |Access Control|Access Control ensures that resources are only granted to those users who are entitled to them.| |Access Control|Access Control ensures that resources are only granted to those users who are entitled to them.|
-|Access Control List|(ACL). A list of permissions attached to an object.|+|Access Control List|ACL.
 +|:::|A list of permissions attached to an object.|
 |Access Control Service|A security service that provides protection of system resources against unauthorized access.  The two basic mechanisms for implementing this service are ACLs and tickets.| |Access Control Service|A security service that provides protection of system resources against unauthorized access.  The two basic mechanisms for implementing this service are ACLs and tickets.|
 |Access Matrix|An Access Matrix uses rows to represent subjects and columns to represent objects with privileges listed in each cell.| |Access Matrix|An Access Matrix uses rows to represent subjects and columns to represent objects with privileges listed in each cell.|
 |Account Harvesting|The process of collecting all the legitimate account names on a system.| |Account Harvesting|The process of collecting all the legitimate account names on a system.|
 |Active Content|Program code embedded in the contents of a web page.  When the page is accessed by a web browser, the embedded code is automatically downloaded and executed on the user's workstation. Ex. Java, ActiveX (MS).| |Active Content|Program code embedded in the contents of a web page.  When the page is accessed by a web browser, the embedded code is automatically downloaded and executed on the user's workstation. Ex. Java, ActiveX (MS).|
-|Active Directory|(AD) A directory service implemented by Microsoft for Windows domain networks. |+|Active Directory|AD.
 +|:::|A directory service implemented by Microsoft for Windows domain networks. |
 |Activity Monitors|Aim to prevent virus infection by monitoring for malicious activity on a system, and blocking that activity when possible.| |Activity Monitors|Aim to prevent virus infection by monitoring for malicious activity on a system, and blocking that activity when possible.|
 |AD|Active Directory.  A directory service implemented by Microsoft for Windows domain networks. | |AD|Active Directory.  A directory service implemented by Microsoft for Windows domain networks. |
 |ADAL| Authoritive Data Access Layer.| |ADAL| Authoritive Data Access Layer.|
-|Address Resolution Protocol|(ARP) A protocol for mapping an Internet Protocol address to a physical machine address that is recognized in the local network.  A table, usually called the ARP cache, is used to maintain a correlation between each MAC address and its corresponding IP address.  ARP provides the protocol rules for making this correlation and providing address conversion in both directions.| +|Address Resolution Protocol|ARP.
-|ADS| Authoritive Data Source.|+|:::|A protocol for mapping an Internet Protocol address to a physical machine address that is recognized in the local network.  A table, usually called the ARP cache, is used to maintain a correlation between each MAC address and its corresponding IP address.  ARP provides the protocol rules for making this correlation and providing address conversion in both directions.| 
 +|ADS|Authoritive Data Source.|
 |ADSL|Asymmetric Digital Subscriber Line (ADSL) is a technology for transmitting digital information at high bandwidth on existing phone lines to homes and businesses.  Unlike regular dialup phone service, ADSL provides continuously-available, “always on” connection. | |ADSL|Asymmetric Digital Subscriber Line (ADSL) is a technology for transmitting digital information at high bandwidth on existing phone lines to homes and businesses.  Unlike regular dialup phone service, ADSL provides continuously-available, “always on” connection. |
-|Advanced Encryption Standard|(AES) An encryption standard being developed by NIST.  Intended to specify an unclassified, publicly-disclosed, symmetric encryption algorithm.| +|Advanced Encryption Standard|AES.
-|AEOD | After End-of-Day.|+|:::|An encryption standard being developed by NIST.  Intended to specify an unclassified, publicly-disclosed, symmetric encryption algorithm.| 
 +|AEOD|After End-of-Day.|
 |AES|Advanced Encryption Standard.  An encryption standard being developed by NIST.  Intended to specify an unclassified, publicly-disclosed, symmetric encryption algorithm.| |AES|Advanced Encryption Standard.  An encryption standard being developed by NIST.  Intended to specify an unclassified, publicly-disclosed, symmetric encryption algorithm.|
-|AIRB| Advanced Internal Rating Based Approach.| +|AIRB|Advanced Internal Rating Based Approach.| 
-|A&L| Assets and Liabilities | +|A&L|Assets and Liabilities | 
-|Algorithm| A finite set of step-by-step instructions for a problem-solving or computation procedure, especially one that can be implemented by a computer.|+|Algorithm|A finite set of step-by-step instructions for a problem-solving or computation procedure, especially one that can be implemented by a computer.|
 |AML|Anti money laundering (AML) is a term mainly used in the financial and legal industries to describe the legal controls that require financial institutions and other regulated entities to prevent or report money laundering activities.| |AML|Anti money laundering (AML) is a term mainly used in the financial and legal industries to describe the legal controls that require financial institutions and other regulated entities to prevent or report money laundering activities.|
 |AMSC|Application Management Service Centre.| |AMSC|Application Management Service Centre.|
Line 49: Line 53:
 |:::|A globally unique number assigned by a registrar for the purposes of Internet routing, | |:::|A globally unique number assigned by a registrar for the purposes of Internet routing, |
 |Asymmetric Cryptography|Public-key cryptography.  A modern branch of cryptography in which the algorithms employ a pair of keys (a public key and a private key) and use a different component of the pair for different steps of the algorithm.| |Asymmetric Cryptography|Public-key cryptography.  A modern branch of cryptography in which the algorithms employ a pair of keys (a public key and a private key) and use a different component of the pair for different steps of the algorithm.|
-|Asymmetric Warfare | Asymmetric warfare is the application of dissimilar strategies, tactics, capabilities and approaches used to circumvent or negate an opponent's strengths while exploiting his weaknesses.|+|Asymmetric Warfare|Asymmetric warfare is the application of dissimilar strategies, tactics, capabilities and approaches used to circumvent or negate an opponent's strengths while exploiting his weaknesses.|
 |Auditing|The information gathering and analysis of assets to ensure such things as policy compliance and security from vulnerabilities.| |Auditing|The information gathering and analysis of assets to ensure such things as policy compliance and security from vulnerabilities.|
 |Asymmetric Digital Subscriber Line|ADSL.| |Asymmetric Digital Subscriber Line|ADSL.|
Line 61: Line 65:
 |Authorization|The approval, permission, or empowerment for someone or something to do something.| |Authorization|The approval, permission, or empowerment for someone or something to do something.|
 |Autonomous System|One network or series of networks that are all under one administrative control.  An autonomous system is also sometimes referred to as a routing domain.  For the purposes of Internet routing, an autonomous system is assigned a globally unique number by a registrar, called an Autonomous System Number (ASN).| |Autonomous System|One network or series of networks that are all under one administrative control.  An autonomous system is also sometimes referred to as a routing domain.  For the purposes of Internet routing, an autonomous system is assigned a globally unique number by a registrar, called an Autonomous System Number (ASN).|
-|Autonomous System Number|ASN.  A globally unique number assigned by a registrar for the purposes of Internet routing.|+|Autonomous System Number|ASN.
 +|:::|A globally unique number assigned by a registrar for the purposes of Internet routing.|
 |Availability|The need to ensure that the business purpose of the system can be met and that it is accessible to those who need to use it.| |Availability|The need to ensure that the business purpose of the system can be met and that it is accessible to those who need to use it.|
 |Backdoor|A backdoor is a tool installed after a compromise to give an attacker easier access to the compromised system around any security mechanisms that are in place.| |Backdoor|A backdoor is a tool installed after a compromise to give an attacker easier access to the compromised system around any security mechanisms that are in place.|
Line 67: Line 72:
 |Banner|A banner is the information that is displayed to a remote user trying to connect to a service.  This may include version information, system information, or a warning about authorized use.| |Banner|A banner is the information that is displayed to a remote user trying to connect to a service.  This may include version information, system information, or a warning about authorized use.|
 |BAP|Business and Personal.| |BAP|Business and Personal.|
-|Basic Authentication | Basic Authentication is the simplest web-based authentication scheme that works by sending the username and password with each request.| +|Basic Authentication|Basic Authentication is the simplest web-based authentication scheme that works by sending the username and password with each request.| 
 |Bastion Host|A bastion host has been hardened in anticipation of vulnerabilities that have not been discovered yet.| |Bastion Host|A bastion host has been hardened in anticipation of vulnerabilities that have not been discovered yet.|
 |BAU|Business as Usual.| |BAU|Business as Usual.|
-|BBS|A Bulletin Board System (BBS) is a computerized meeting and announcement system that allows people to carry on discussions, upload and download files, and record observations and points of view without having to be simultaneously connected to the system at any given time.|+|BBS|Bulletin Board System.| 
 +|:::|A Bulletin Board System (BBS) is a computerized meeting and announcement system that allows people to carry on discussions, upload and download files, and record observations and points of view without having to be simultaneously connected to the system at any given time.|
 |BCM|Business Continuity Management. The management of a Business Continuity Plan (BCP).| |BCM|Business Continuity Management. The management of a Business Continuity Plan (BCP).|
 |BCP|Business Continuity Plan. A Business Continuity Plan is the plan for emergency response, backup operations, and post-disaster recovery steps that will ensure the availability of critical resources and facilitate the continuity of operations in an emergency situation.| |BCP|Business Continuity Plan. A Business Continuity Plan is the plan for emergency response, backup operations, and post-disaster recovery steps that will ensure the availability of critical resources and facilitate the continuity of operations in an emergency situation.|
Line 88: Line 94:
 |BLoR|Business List of Records.  An indexed list of relevant records.| |BLoR|Business List of Records.  An indexed list of relevant records.|
 |BOM|Business Only Membership.| |BOM|Business Only Membership.|
-|Border Gateway Protocol|BGP.  An inter-autonomous system routing protocol.  BGP is used to exchange routing information for the Internet and is the protocol used between Internet service providers (ISP).|+|Border Gateway Protocol|BGP.
 +|:::|An inter-autonomous system routing protocol.  BGP is used to exchange routing information for the Internet and is the protocol used between Internet service providers (ISP).|
 |Boot Record Infector|A boot record infector is a piece of malware that inserts malicious code into the boot sector of a disk.| |Boot Record Infector|A boot record infector is a piece of malware that inserts malicious code into the boot sector of a disk.|
 |Bot|Also called ‘Internet bots’; refers to computers that perform tasks without human input.  Increasingly used for click-fraud and other malicious purposes.| |Bot|Also called ‘Internet bots’; refers to computers that perform tasks without human input.  Increasingly used for click-fraud and other malicious purposes.|
Line 102: Line 109:
 |Brute Force|A crypto-analysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one.| |Brute Force|A crypto-analysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, one-by-one.|
 |BSM|Balance Sheet Management.| |BSM|Balance Sheet Management.|
-|BSS 7799|British Standard 7799.  A standard code of practice and provides guidance on how to secure an information system.  It includes the management framework, objectives, and control requirements for information security management systems.|+|BSS 7799|British Standard 7799.
 +|:::|A standard code of practice and provides guidance on how to secure an information system.  It includes the management framework, objectives, and control requirements for information security management systems.|
 |BST|British Summer Time.| |BST|British Summer Time.|
 |Buffer Overflow|A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold.  Since buffers are created to contain a finite amount of data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting or overwriting the valid data held in them.| |Buffer Overflow|A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold.  Since buffers are created to contain a finite amount of data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting or overwriting the valid data held in them.|
 |Bullet-proof hosting|Bullet-proof hosting is a service provided by some domain hosting or web hosting firms that allow their customer considerable leniency in the kinds of material they may upload and distribute.  This leniency has been taken advantage of by spammers and providers of online gambling or pornography.| |Bullet-proof hosting|Bullet-proof hosting is a service provided by some domain hosting or web hosting firms that allow their customer considerable leniency in the kinds of material they may upload and distribute.  This leniency has been taken advantage of by spammers and providers of online gambling or pornography.|
-|Bulletin Board System|A Bulletin Board System (BBS) is a computerized meeting and announcement system that allows people to carry on discussions, upload and download files, and record observations and points of view without having to be simultaneously connected to the system at any given time.| +|Bulletin Board System|BBS| 
-|Business Continuity Management|BCM. The management of a Business Continuity Plan (BCP).| +|:::|A Bulletin Board System (BBS) is a computerized meeting and announcement system that allows people to carry on discussions, upload and download files, and record observations and points of view without having to be simultaneously connected to the system at any given time.| 
-|Business Continuity Plan|BCP.  A Business Continuity Plan is the plan for emergency response, backup operations, and post-disaster recovery steps that will ensure the availability of critical resources and facilitate the continuity of operations in an emergency situation.| +|Business Continuity Management|BCM.
-|Business Impact Analysis|BIA.  A Business Impact Analysis determines what levels of impact to a system are tolerable.|+|:::|The management of a Business Continuity Plan (BCP).| 
 +|Business Continuity Plan|BCP.
 +|:::|A Business Continuity Plan is the plan for emergency response, backup operations, and post-disaster recovery steps that will ensure the availability of critical resources and facilitate the continuity of operations in an emergency situation.| 
 +|Business Impact Analysis|BIA.
 +|:::|A Business Impact Analysis determines what levels of impact to a system are tolerable.|
 |Business Intelligence|Business intelligence is now widely accepted as being concerned with information technology solutions for transforming the output from large data collections into Intelligence; usually through the integration of sales, marketing, servicing, and support operations.  It covers such activities as customer relationship management, enterprise resource planning and e-commerce using data mining techniques.  Those people involved in business intelligence tend to regard it as one aspect of knowledge management.  Systems based on business intelligence software were formerly known as Executive information Systems.| |Business Intelligence|Business intelligence is now widely accepted as being concerned with information technology solutions for transforming the output from large data collections into Intelligence; usually through the integration of sales, marketing, servicing, and support operations.  It covers such activities as customer relationship management, enterprise resource planning and e-commerce using data mining techniques.  Those people involved in business intelligence tend to regard it as one aspect of knowledge management.  Systems based on business intelligence software were formerly known as Executive information Systems.|
 |BYOD|Bring Your Own Device.| |BYOD|Bring Your Own Device.|
Line 115: Line 127:
 |CA|Certificate Authority.| |CA|Certificate Authority.|
 |CAB|Change Advisory Board.| |CAB|Change Advisory Board.|
-|CAC|Call Admission Control.  The inspection and control all inbound and outbound voice network activity by a voice firewall based on user-defined policies.|+|CAC|Call Admission Control.
 +|:::|The inspection and control all inbound and outbound voice network activity by a voice firewall based on user-defined policies.|
 |Cache|Pronounced cash, a special high-speed storage mechanism.  It can be either a reserved section of main memory or an independent high-speed storage device.  Two types of caching are commonly used in personal computers: memory caching and disk caching.| |Cache|Pronounced cash, a special high-speed storage mechanism.  It can be either a reserved section of main memory or an independent high-speed storage device.  Two types of caching are commonly used in personal computers: memory caching and disk caching.|
 |Cache Cramming|Cache Cramming is the technique of tricking a browser to run cached Java code from the local disk, instead of the internet zone, so it runs with less restrictive permissions.| |Cache Cramming|Cache Cramming is the technique of tricking a browser to run cached Java code from the local disk, instead of the internet zone, so it runs with less restrictive permissions.|
 |Cache Poisoning|Malicious or misleading data from a remote name server is saved [cached] by another name server.  Typically used with DNS cache poisoning attacks.| |Cache Poisoning|Malicious or misleading data from a remote name server is saved [cached] by another name server.  Typically used with DNS cache poisoning attacks.|
-|Call Admission Control|CAC.  The inspection and control all inbound and outbound voice network activity by a voice firewall based on user-defined policies.|+|Call Admission Control|CAC.
 +|:::|The inspection and control all inbound and outbound voice network activity by a voice firewall based on user-defined policies.|
 |CAMS|Cash Management System.| |CAMS|Cash Management System.|
 |Carding|Carding is a term used for a process to verify the validity of stolen card data.  The thief presents the card information on a website that has real-time transaction processing.  If the card is processed successfully, the thief knows that the card is still good.  The specific item purchased is immaterial, and the thief does not need to purchase an actual product; a Web site subscription or charitable donation would be sufficient.  The purchase is usually for a small monetary amount, both to avoid using the card's credit limit, and also to avoid attracting the card issuer's attention.  A website known to be susceptible to carding is known as a cartable website.| |Carding|Carding is a term used for a process to verify the validity of stolen card data.  The thief presents the card information on a website that has real-time transaction processing.  If the card is processed successfully, the thief knows that the card is still good.  The specific item purchased is immaterial, and the thief does not need to purchase an actual product; a Web site subscription or charitable donation would be sufficient.  The purchase is usually for a small monetary amount, both to avoid using the card's credit limit, and also to avoid attracting the card issuer's attention.  A website known to be susceptible to carding is known as a cartable website.|
 |Cash-out|The aspect of a cybercrime operation where stolen electronic funds are finally withdrawn from the finance system in the form of hard cash, often perpetrated by the use of ‘money mules’.| |Cash-out|The aspect of a cybercrime operation where stolen electronic funds are finally withdrawn from the finance system in the form of hard cash, often perpetrated by the use of ‘money mules’.|
-|CCO|Chief Controls Office.  The Chief Controls Office centralizes and increases the focus on maintaining and enhancing an effective control framework.|+|CCO|Chief Controls Office.
 +|:::|The Chief Controls Office centralizes and increases the focus on maintaining and enhancing an effective control framework.|
 |CDC|Client Data Controls.| |CDC|Client Data Controls.|
 |CDI|Client Data Interface.| |CDI|Client Data Interface.|
Line 175: Line 190:
 |CRAID|Changes, Risks, Assumptions, Issues, Dependencies.| |CRAID|Changes, Risks, Assumptions, Issues, Dependencies.|
 |Crawler|A crawler uses existing Internet search engines to carry out automatic search and retrieval of selected Information on behalf of a user.  It may also be known as Web crawler.| |Crawler|A crawler uses existing Internet search engines to carry out automatic search and retrieval of selected Information on behalf of a user.  It may also be known as Web crawler.|
-|CRC|Cyclic Redundancy Check.  Sometimes called "cyclic redundancy code."  A type of checksum algorithm that is not a cryptographic hash but is used to implement data integrity service where accidental changes to data are expected.|+|CRC|Cyclic Redundancy Check.
 +|:::|Sometimes called "cyclic redundancy code."  A type of checksum algorithm that is not a cryptographic hash but is used to implement data integrity service where accidental changes to data are expected.|
 |Criminal Forum|A forum, usually web based, devoted to the black market trading of stolen credit card details, stolen identity details and tools to commit computer offences.| |Criminal Forum|A forum, usually web based, devoted to the black market trading of stolen credit card details, stolen identity details and tools to commit computer offences.|
 |CRON|Cron is a Unix application that runs jobs for users and administrators at scheduled times of the day.| |CRON|Cron is a Unix application that runs jobs for users and administrators at scheduled times of the day.|
Line 200: Line 216:
 |DBC|Detailed Business Case.| |DBC|Detailed Business Case.|
 |DCF|Data Control Framework.| |DCF|Data Control Framework.|
-|DCO|Device Configuration Overlay.  A hidden part of a hard drive that is used by personal computer manufacturers to specify the configuration of a hard drive (regardless of its actual size) to present the same number of sectors to the BIOS and operating system.|+|DCO|Device Configuration Overlay.
 +|:::|A hidden part of a hard drive that is used by personal computer manufacturers to specify the configuration of a hard drive (regardless of its actual size) to present the same number of sectors to the BIOS and operating system.|
 |DCP|Demand Change Process.| |DCP|Demand Change Process.|
-|DDOS|Distributed Denial of Service (DDOS) is an attack in which multiple systems flood the bandwidth or resources of a targeted system in an attempt to make it unavailable.  DDOS attacks fall into two basic categories based on the resources they seek to exhaust: application attacks (exploitation of software vulnerabilities) and network attacks (attempting to saturate the communications lines that connect servers to the Internet).|+|DDOS|Distributed Denial of Service.| 
 +|:::|Distributed Denial of Service (DDOS) is an attack in which multiple systems flood the bandwidth or resources of a targeted system in an attempt to make it unavailable.  DDOS attacks fall into two basic categories based on the resources they seek to exhaust: application attacks (exploitation of software vulnerabilities) and network attacks (attempting to saturate the communications lines that connect servers to the Internet).|
 |Decapsulation | Decapsulation is the process of stripping off one layer's headers and passing the rest of the packet up to the next higher layer on the protocol stack.| |Decapsulation | Decapsulation is the process of stripping off one layer's headers and passing the rest of the packet up to the next higher layer on the protocol stack.|
 |Decryption|Decryption is the process of transforming an encrypted message into its original plain-text.| |Decryption|Decryption is the process of transforming an encrypted message into its original plain-text.|
Line 208: Line 226:
 |Defacement|Defacement is the method of modifying the content of a website in such a way that it becomes "vandalized" or embarrassing to the website owner.| |Defacement|Defacement is the method of modifying the content of a website in such a way that it becomes "vandalized" or embarrassing to the website owner.|
 |Defense In-Depth|Defense In-Depth is the approach of using multiple layers of security to guard against failure of a single security component.| |Defense In-Depth|Defense In-Depth is the approach of using multiple layers of security to guard against failure of a single security component.|
-|Demilitarized Zone|DMZ.  In computer security, in general a demilitarized zone (DMZ) or perimeter network is a network area (a sub-network) that sits between an organization's internal network and an external network, usually the Internet.  DMZ's help to enable the layered security model in that they provide sub-network segmentation based on security requirements or policy.  DMZ's provide either a transit mechanism from a secure source to an insecure destination or from an insecure source to a more secure destination.  In some cases, a screened subnet which is used for servers accessible from the outside is referred to as a DMZ.|+|Demilitarized Zone|DMZ.
 +|:::|In computer security, in general a demilitarized zone (DMZ) or perimeter network is a network area (a sub-network) that sits between an organization's internal network and an external network, usually the Internet.  DMZ's help to enable the layered security model in that they provide sub-network segmentation based on security requirements or policy.  DMZ's provide either a transit mechanism from a secure source to an insecure destination or from an insecure source to a more secure destination.  In some cases, a screened subnet which is used for servers accessible from the outside is referred to as a DMZ.|
 |Denial of Service|The prevention of authorized access to a system resource or the delaying of system operations and functions.| |Denial of Service|The prevention of authorized access to a system resource or the delaying of system operations and functions.|
 |DES|Data Encryption Standard).| |DES|Data Encryption Standard).|
Line 217: Line 236:
 |Digest Authentication|Digest Authentication allows a web client to compute MD5 hashes of the password to prove it has the password.| |Digest Authentication|Digest Authentication allows a web client to compute MD5 hashes of the password to prove it has the password.|
 |Digital Certificate|A digital certificate is an electronic "credit card" that establishes your credentials when doing business or other transactions on the Web.  It is issued by a certification authority.  It contains your name, a serial number, expiration dates, a copy of the certificate holder's public key (used for encrypting messages and digital signatures), and the digital signature of the certificate-issuing authority so that a recipient can verify that the certificate is real.| |Digital Certificate|A digital certificate is an electronic "credit card" that establishes your credentials when doing business or other transactions on the Web.  It is issued by a certification authority.  It contains your name, a serial number, expiration dates, a copy of the certificate holder's public key (used for encrypting messages and digital signatures), and the digital signature of the certificate-issuing authority so that a recipient can verify that the certificate is real.|
-|Digital Envelope| A digital envelope is an encrypted message with the encrypted session key.| +|Digital Envelope|A digital envelope is an encrypted message with the encrypted session key.| 
-|Digital Signature| A digital signature is a hash of a message that uniquely identifies the sender of the message and proves the message hasn't changed since transmission. | +|Digital Signature|A digital signature is a hash of a message that uniquely identifies the sender of the message and proves the message hasn't changed since transmission. | 
-|Digital Signature Algorithm|DSA.  An asymmetric cryptographic algorithm that produces a digital signature in the form of a pair of large numbers.  The signature is computed using rules and parameters such that the identity of the signer and the integrity of the signed data can be verified.| +|Digital Signature Algorithm|DSA.
-|Digital Signature Standard|DSS.  The US Government standard that specifies the Digital Signature Algorithm (DSA), which involves asymmetric cryptography.|+|:::|An asymmetric cryptographic algorithm that produces a digital signature in the form of a pair of large numbers.  The signature is computed using rules and parameters such that the identity of the signer and the integrity of the signed data can be verified.| 
 +|Digital Signature Standard|DSS.
 +|:::|The US Government standard that specifies the Digital Signature Algorithm (DSA), which involves asymmetric cryptography.|
 |Disassembly|The process of taking a binary program and deriving the source code from it.| |Disassembly|The process of taking a binary program and deriving the source code from it.|
-|Disaster Recovery Plan|DRP.  A Disaster Recovery Plan is the process of recovery of IT systems in the event of a disruption or disaster.| +|Disaster Recovery Plan|DRP.
-|Discretionary Access Control|DAC.  Discretionary Access Control consists of something the user can manage, such as a document password.|+|:::|A Disaster Recovery Plan is the process of recovery of IT systems in the event of a disruption or disaster.| 
 +|Discretionary Access Control|DAC.
 +|:::|Discretionary Access Control consists of something the user can manage, such as a document password.|
 |Dispensation|Temporary exclusion from Policy or Scope.| |Dispensation|Temporary exclusion from Policy or Scope.|
 |Disruption|A circumstance or event that interrupts or prevents the correct operation of system services and functions.| |Disruption|A circumstance or event that interrupts or prevents the correct operation of system services and functions.|
 |Distance Vector|Distance vectors measure the cost of routes to determine the best route to all known networks.| |Distance Vector|Distance vectors measure the cost of routes to determine the best route to all known networks.|
-|Distributed Denial of Service|DDOS. Distributed Denial of Service (DDOS) is an attack in which multiple systems flood the bandwidth or resources of a targeted system in an attempt to make it unavailable.  DDOS attacks fall into two basic categories based on the resources they seek to exhaust: application attacks (exploitation of software vulnerabilities) and network attacks (attempting to saturate the communications lines that connect servers to the Internet).|+|Distributed Denial of Service|DDOS.
 +|:::|Distributed Denial of Service (DDOS) is an attack in which multiple systems flood the bandwidth or resources of a targeted system in an attempt to make it unavailable.  DDOS attacks fall into two basic categories based on the resources they seek to exhaust: application attacks (exploitation of software vulnerabilities) and network attacks (attempting to saturate the communications lines that connect servers to the Internet).|
 |Distributed Scans|Distributed Scans are scans that use multiple source addresses to gather information.| |Distributed Scans|Distributed Scans are scans that use multiple source addresses to gather information.|
 |DLL|Dynamic Link Library.| |DLL|Dynamic Link Library.|
Line 241: Line 265:
 |Domain Hijacking|Domain hijacking is an attack by which an attacker takes over a domain by first blocking access to the domain's DNS server and then putting his own server up in its place.| |Domain Hijacking|Domain hijacking is an attack by which an attacker takes over a domain by first blocking access to the domain's DNS server and then putting his own server up in its place.|
 |Domain Name|A domain name locates an organization or other entity on the Internet.  For example, the domain name "www.sans.org" locates an Internet address for "sans.org" at Internet point 199.0.0.2 and a particular host server named "www" The "org" part of the domain name reflects the purpose of the organization or entity (in this example, "organization") and is called the top-level domain name.  The "sans" part of the domain name defines the organization or entity and together with the top-level is called the second-level domain name.| |Domain Name|A domain name locates an organization or other entity on the Internet.  For example, the domain name "www.sans.org" locates an Internet address for "sans.org" at Internet point 199.0.0.2 and a particular host server named "www" The "org" part of the domain name reflects the purpose of the organization or entity (in this example, "organization") and is called the top-level domain name.  The "sans" part of the domain name defines the organization or entity and together with the top-level is called the second-level domain name.|
-|Domain Name System|DNS.  The domain name system (DNS) is the way that Internet domain names are located and translated into Internet Protocol addresses. A domain name is a meaningful and easy-to-remember "handle" for an Internet address.|+|Domain Name System|DNS.
 +|:::|The domain name system (DNS) is the way that Internet domain names are located and translated into Internet Protocol addresses. A domain name is a meaningful and easy-to-remember "handle" for an Internet address.|
 |Download|To download is to retrieve Information from the Internet.| |Download|To download is to retrieve Information from the Internet.|
 |DP|Discussion Paper.| |DP|Discussion Paper.|
Line 259: Line 284:
 |DWB|Dispensation, Waivers and Breaches.| |DWB|Dispensation, Waivers and Breaches.|
 |DX|Developer Experience.| |DX|Developer Experience.|
-|Dynamic Link Library|DLL.  A collection of small programs, any of which can be called when needed by a larger program that is running in the computer.  The small program that lets the larger program communicate with a specific device such as a printer or scanner is often packaged as a DLL program (usually referred to as a DLL file).|+|Dynamic Link Library|DLL.
 +|:::|A collection of small programs, any of which can be called when needed by a larger program that is running in the computer.  The small program that lets the larger program communicate with a specific device such as a printer or scanner is often packaged as a DLL program (usually referred to as a DLL file).|
 |Dynamic Routing Protocol|Allows network devices to learn routes. Ex. RIP, EIGRP Dynamic routing occurs when routers talk to adjacent routers, informing each other of what networks each router is currently connected to.  The routers must communicate using a routing protocol, of which there are many to choose from.  The process on the router that is running the routing protocol, communicating with its neighbour routers, is usually called a routing daemon.  The routing daemon updates the kernel's routing table with information it receives from neighbour routers.| |Dynamic Routing Protocol|Allows network devices to learn routes. Ex. RIP, EIGRP Dynamic routing occurs when routers talk to adjacent routers, informing each other of what networks each router is currently connected to.  The routers must communicate using a routing protocol, of which there are many to choose from.  The process on the router that is running the routing protocol, communicating with its neighbour routers, is usually called a routing daemon.  The routing daemon updates the kernel's routing table with information it receives from neighbour routers.|
 |E2E|End-to-End.  The entire process.| |E2E|End-to-End.  The entire process.|
Line 294: Line 320:
 |Exposure|A threat action whereby sensitive data is directly released to an unauthorized entity.| |Exposure|A threat action whereby sensitive data is directly released to an unauthorized entity.|
 |Extended ACLS|Cisco.  Extended ACLs are a more powerful form of Standard ACLs on Cisco routers.  They can make filtering decisions based on IP addresses (source or destination), Ports (source or destination), protocols, and whether a session is established.| |Extended ACLS|Cisco.  Extended ACLs are a more powerful form of Standard ACLs on Cisco routers.  They can make filtering decisions based on IP addresses (source or destination), Ports (source or destination), protocols, and whether a session is established.|
-|Extensible Authentication Protocol|EAP.  A framework that supports multiple, optional authentication mechanisms for PPP, including clear-text passwords, challenge-response, and arbitrary dialog sequences.| +|Extensible Authentication Protocol|EAP.
-|Exterior Gateway Protocol|EGP.  A protocol which distributes routing information to the routers which connect autonomous systems.|+|:::|A framework that supports multiple, optional authentication mechanisms for PPP, including clear-text passwords, challenge-response, and arbitrary dialog sequences.| 
 +|Exterior Gateway Protocol|EGP.
 +|:::|A protocol which distributes routing information to the routers which connect autonomous systems.|
 |Extranet|Extranet is that portion of an organization’s Intranet that is accessible by selected individuals (for example, collaborators, suppliers, partners, major customers).| |Extranet|Extranet is that portion of an organization’s Intranet that is accessible by selected individuals (for example, collaborators, suppliers, partners, major customers).|
 |False Rejects|False Rejects are when an authentication system fails to recognize a valid user.| |False Rejects|False Rejects are when an authentication system fails to recognize a valid user.|
 |Fast File System|The first major revision to the Unix file system, providing faster read access and faster (delayed, asynchronous) write access through a disk cache and better file system layout on disk.  It uses inodes (pointers) and data blocks.| |Fast File System|The first major revision to the Unix file system, providing faster read access and faster (delayed, asynchronous) write access through a disk cache and better file system layout on disk.  It uses inodes (pointers) and data blocks.|
 |Fast Flux|Protection method used by botnets consisting of a continuous and fast change of the DNS records for a domain name through different IP addresses.| |Fast Flux|Protection method used by botnets consisting of a continuous and fast change of the DNS records for a domain name through different IP addresses.|
-|FAT|Functional Acceptance Testing.  See FCT.| +|FAT|Functional Acceptance Testing.
-|Fault Line Attacks | Fault Line Attacks use weaknesses between interfaces of systems to exploit gaps in coverage.| +|:::|See FCT.| 
-|FCT|Functional Confidence Testing.  Functional testing covers Unit Testing, Smoke Testing, Sanity Testing, Intergration Testing (Top Down, Bottom Up), Interface and Useability Testing, System Testing, Regression Testing, Per User Acceptance Testing (Alpha and Beta), User Acceptance Testing, White Box and Black Box Testing, Globalization and Location Testing.|+|Fault Line Attacks|Fault Line Attacks use weaknesses between interfaces of systems to exploit gaps in coverage.| 
 +|FCT|Functional Confidence Testing.
 +|:::|Functional testing covers Unit Testing, Smoke Testing, Sanity Testing, Intergration Testing (Top Down, Bottom Up), Interface and Useability Testing, System Testing, Regression Testing, Per User Acceptance Testing (Alpha and Beta), User Acceptance Testing, White Box and Black Box Testing, Globalization and Location Testing.|
 |File Transfer Protocol|FTP.  A TCP/IP protocol specifying the transfer of text or binary files across the network.| |File Transfer Protocol|FTP.  A TCP/IP protocol specifying the transfer of text or binary files across the network.|
 |Filter A filter is used to specify which packets will or will not be used.  It can be used in sniffers to determine which packets get displayed, or by firewalls to determine which packets get blocked.| |Filter A filter is used to specify which packets will or will not be used.  It can be used in sniffers to determine which packets get displayed, or by firewalls to determine which packets get blocked.|
Line 373: Line 403:
 |Industrial Espionage|Espionage is the use of illegal means (spying) to collect Information, more particularly secret or unpublished information.| |Industrial Espionage|Espionage is the use of illegal means (spying) to collect Information, more particularly secret or unpublished information.|
 |INETD|Inetd (or Internet Daemon) is an application that controls smaller internet services like telnet, ftp, and POP.| |INETD|Inetd (or Internet Daemon) is an application that controls smaller internet services like telnet, ftp, and POP.|
-| Inference Attack | Inference Attacks rely on the user to make logical connections between seemingly unrelated pieces of information.| +|Inference Attack|Inference Attacks rely on the user to make logical connections between seemingly unrelated pieces of information.| 
-| Information Warfare | Information Warfare is the competition between offensive and defensive players over information resources.| +|Information Warfare|Information Warfare is the competition between offensive and defensive players over information resources.| 
-| Ingress Filtering | Ingress Filtering is filtering inbound traffic.| +|Ingress Filtering|Ingress Filtering is filtering inbound traffic.| 
-| Input Validations Attack | Input Validations Attacks are where an attacker intentionally sends unusual input in the hopes of confusing an application.| +|Input Validations Attack|Input Validations Attacks are where an attacker intentionally sends unusual input in the hopes of confusing an application.| 
-| Integrity | Integrity is the need to ensure that information has not been changed accidentally or deliberately, and that it is accurate and complete.| +|Integrity | Integrity is the need to ensure that information has not been changed accidentally or deliberately, and that it is accurate and complete.| 
-| Integrity Star Property | In Integrity Star Property a user cannot read data of a lower integrity level then their own.| +|Integrity Star Property|In Integrity Star Property a user cannot read data of a lower integrity level then their own.| 
-| Intellectual Property | Intellectual Property refers to the definition and recording of a novel device, product, process or technique so that it may be bought, sold or legally protected.  The main forms of protection take the form of Copyright, licenses, patents, registered designs, trademarks and trade secrets.| +|Intellectual Property|Intellectual Property refers to the definition and recording of a novel device, product, process or technique so that it may be bought, sold or legally protected.  The main forms of protection take the form of Copyright, licenses, patents, registered designs, trademarks and trade secrets.| 
-| Intelligence | Intelligence is high-level, processed, exploitable Information.| +|Intelligence|Intelligence is high-level, processed, exploitable Information.| 
-| International Organization for Standardization (ISO) | A voluntary, non-treaty, non-government organization, established in 1947, with voting members that are designated standards bodies of participating nations and non-voting observer organizations.| +|International Organization for Standardization (ISO)|A voluntary, non-treaty, non-government organization, established in 1947, with voting members that are designated standards bodies of participating nations and non-voting observer organizations.| 
-| International Telecommunications Union (ITU-T| Telecommunication Standardization Sector (formerly "CCITT"), a United Nations treaty organization that is composed mainly of postal, telephone, and telegraph authorities of the member countries and that publishes standards called "Recommendations."+|International Telecommunications Union|ITU-T.| 
-| Internet | A term to describe connecting multiple separate networks together.| +|:::|Telecommunication Standardization Sector (formerly "CCITT"), a United Nations treaty organization that is composed mainly of postal, telephone, and telegraph authorities of the member countries and that publishes standards called "Recommendations."
-| Internet Control Message Protocol (ICMP| An Internet Standard protocol that is used to report error conditions during IP datagram processing and to exchange other information concerning the state of the IP network.| +|Internet|A term to describe connecting multiple separate networks together.| 
-| Internet Engineering Task Force (IETF| The body that defines standard Internet operating protocols such as TCP/IP.  The IETF is supervised by the Internet Society Internet Architecture Board (IAB).  IETF members are drawn from the Internet Society's individual and organization membership.| +|Internet Control Message Protocol|ICMP.| 
-| Internet Message Access Protocol (IMAP| A protocol that defines how a client should fetch mail from and return mail to a mail server.  IMAP is intended as a replacement for or extension to the Post Office Protocol (POP).  It is defined in RFC 1203 (v3) and RFC 2060 (v4).| +|:::|An Internet Standard protocol that is used to report error conditions during IP datagram processing and to exchange other information concerning the state of the IP network.| 
-| Internet Protocol (IP| The method or protocol by which data is sent from one computer to another on the Internet.| +|Internet Engineering Task Force|IETF.| 
-| Internet Protocol Security (IPSEC| A developing standard for security at the network or packet processing layer of network communication.| +|:::|The body that defines standard Internet operating protocols such as TCP/IP.  The IETF is supervised by the Internet Society Internet Architecture Board (IAB).  IETF members are drawn from the Internet Society's individual and organization membership.| 
-| Internet Relay Chat (IRC| Internet Relay Chat (IRC) is a huge, multi-user live chat facility.  Private channels may be created for multi-person Conference calls.| +|Internet Message Access Protocol|IMAP.| 
-| Internet Service Provider (ISP| An Internet Service Provider (ISP) is a company selling access to the Internet.| +|:::|A protocol that defines how a client should fetch mail from and return mail to a mail server.  IMAP is intended as a replacement for or extension to the Post Office Protocol (POP).  It is defined in RFC 1203 (v3) and RFC 2060 (v4).| 
-| Internet Standard | A specification, approved by the IESG and published as an RFC, that is stable and well-understood, is technically competent, has multiple, independent, and interoperable implementations with substantial operational experience, enjoys significant public support, and is recognizably useful in some or all parts of the Internet.| +|Internet Protocol|IP.| 
-| Interrupt | An Interrupt is a signal that informs the OS that something has occurred.| +|:::|The method or protocol by which data is sent from one computer to another on the Internet.| 
-| Intranet | A computer network, especially one based on Internet technology, that an organization uses for its own internal, and usually private, purposes and that is closed to outsiders.| +|Internet Protocol Security|IPSEC.| 
-| Intrusion Detection | A security management system for computers and networks.  An IDS gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions (attacks from outside the organization) and misuse (attacks from within the organization).| +|:::|A developing standard for security at the network or packet processing layer of network communication.| 
-| Invisible Web | Invisible Web is that portion (estimated to be between 60 and 80 per cent) of total Web content that consists of material that is not accessible by standard Search engines.  It is usually to be found embedded within secure sites, or consists of archived material.  Much of the Information may, however, be accessed through a gateway or a fee-based Database service.| +|Internet Relay Chat|IRC.| 
-| IP (Internet Protocol) | The method or protocol by which data is sent from one computer to another on the Internet.| +|:::|Internet Relay Chat (IRC) is a huge, multi-user live chat facility.  Private channels may be created for multi-person Conference calls.| 
-| IP Address | A computer's inter-network address that is assigned for use by the Internet Protocol and other protocols.  An IP version 4 address is written as a series of four 8-bit numbers separated by periods.| +|Internet Service Provider|ISP.| 
-| IP Flood | A denial of service attack that sends a host more echo request ("ping") packets than the protocol implementation can handle.| +|:::|An Internet Service Provider (ISP) is a company selling access to the Internet.| 
-| IP Forwarding | IP forwarding is an Operating System option that allows a host to act as a router.  A system that has more than 1 network interface card must have IP forwarding turned on in order for the system to be able to act as a router.| +|Internet Standard|A specification, approved by the IESG and published as an RFC, that is stable and well-understood, is technically competent, has multiple, independent, and interoperable implementations with substantial operational experience, enjoys significant public support, and is recognizably useful in some or all parts of the Internet.| 
-| IPSEC (Internet Protocol Security) | A developing standard for security at the network or packet processing layer of network communication.| +|Interrupt|An Interrupt is a signal that informs the OS that something has occurred.| 
-| IP Spoofing | The technique of supplying a false IP address.| +|Intranet|A computer network, especially one based on Internet technology, that an organization uses for its own internal, and usually private, purposes and that is closed to outsiders.| 
-| IRC (Internet Relay Chat) | Internet Relay Chat (IRC) is a huge, multi-user live chat facility.  Private channels may be created for multi-person Conference calls.| +|Intrusion Detection|A security management system for computers and networks.  An IDS gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions (attacks from outside the organization) and misuse (attacks from within the organization).| 
-| IRM | Information Risk Management.| +|Invisible Web|Invisible Web is that portion (estimated to be between 60 and 80 per cent) of total Web content that consists of material that is not accessible by standard Search engines.  It is usually to be found embedded within secure sites, or consists of archived material.  Much of the Information may, however, be accessed through a gateway or a fee-based Database service.| 
-| ISO (International Organization for Standardization) | A voluntary, non-treaty, non-government organization, established in 1947, with voting members that are designated standards bodies of participating nations and non-voting observer organizations.| +|IP|Internet Protocol).| 
-| ISP (Internet Service Provider) | An Internet Service Provider (ISP) is a company selling access to the Internet.| +|:::|The method or protocol by which data is sent from one computer to another on the Internet.| 
-| Issue-specific Policy | An Issue-Specific Policy is intended to address specific needs within an organization, such as a password policy.| +|IP Address|A computer's inter-network address that is assigned for use by the Internet Protocol and other protocols.  An IP version 4 address is written as a series of four 8-bit numbers separated by periods.| 
-| ITU-T (International Telecommunications Union) | Telecommunication Standardization Sector (formerly "CCITT"), a United Nations treaty organization that is composed mainly of postal, telephone, and telegraph authorities of the member countries and that publishes standards called "Recommendations."+|IP Flood|A denial of service attack that sends a host more echo request ("ping") packets than the protocol implementation can handle.| 
-| Jitter | Jitter or Noise is the modification of fields in a database while preserving the aggregate characteristics of that make the database useful in the first place.| +|IP Forwarding|IP forwarding is an Operating System option that allows a host to act as a router.  A system that has more than 1 network interface card must have IP forwarding turned on in order for the system to be able to act as a router.| 
-| Jump Bag | A Jump Bag is a container that has all the items necessary to respond to an incident inside to help mitigate the effects of delayed reactions.| +|IPSEC|Internet Protocol Security).| 
-| Kerberos | A system developed at the Massachusetts Institute of Technology that depends on passwords and symmetric cryptography (DES) to implement ticket-based, peer entity authentication service and access control service distributed in a client-server network environment.| +|:::|A developing standard for security at the network or packet processing layer of network communication.| 
-| Kernel | The essential centre of a computer operating system, the core that provides basic services for all other parts of the operating system.  A synonym is nucleus.  A kernel can be contrasted with a shell, the outermost part of an operating system that interacts with user commands.  Kernel and shell are terms used more frequently in Unix and some other operating systems than in IBM mainframe systems.| +|IP Spoofing|The technique of supplying a false IP address.| 
-| KYC | Know Your Customer.| +|IRC|Internet Relay Chat (IRC) is a huge, multi-user live chat facility.  Private channels may be created for multi-person Conference calls.| 
-| L2F (Layer 2 Forwarding Protocol) | An Internet protocol (originally developed by Cisco Corporation) that uses tunnelling of PPP over IP to create a virtual extension of a dial-up link across a network, initiated by the dial-up server and transparent to the dial-up user.| +|IRM|Information Risk Management.| 
-| L2FP (Layer 2 Tunnelling Protocol) | An extension of the Point-to-Point Tunnelling Protocol used by an Internet service provider to enable the operation of a virtual private network over the Internet.| +|ISO|International Organization for Standardization).| 
-| Lattice Techniques | Lattice Techniques use security designations to determine access to information.| +|:::|A voluntary, non-treaty, non-government organization, established in 1947, with voting members that are designated standards bodies of participating nations and non-voting observer organizations.| 
-| Layer 2 Forwarding Protocol (L2F) | An Internet protocol (originally developed by Cisco Corporation) that uses tunnelling of PPP over IP to create a virtual extension of a dial-up link across a network, initiated by the dial-up server and transparent to the dial-up user.| +|ISP|Internet Service Provider).| 
-| Layer 2 Tunnelling Protocol (L2FP) | An extension of the Point-to-Point Tunnelling Protocol used by an Internet service provider to enable the operation of a virtual private network over the Internet.| +|:::|An Internet Service Provider (ISP) is a company selling access to the Internet.| 
-| Least Privilege | Least Privilege is the principle of allowing users or applications the least amount of permissions necessary to perform their intended function.| +|Issue-specific Policy | An Issue-Specific Policy is intended to address specific needs within an organization, such as a password policy.| 
-| Legion | Software to detect unprotected shares.| +|ITU-T|International Telecommunications Union).| 
-| Lightweight Directory Access Protocol (LDAP) | A software protocol for enabling anyone to locate organizations, individuals, and other resources such as files and devices in a network, whether on the public Internet or on a corporate Intranet.| +|:::|Telecommunication Standardization Sector (formerly "CCITT"), a United Nations treaty organization that is composed mainly of postal, telephone, and telegraph authorities of the member countries and that publishes standards called "Recommendations."
-| Link State | With link state, routes maintain information about all routers and router-to-router links within a geographic area, and creates a table of best routes with that information.| +|Jitter|Jitter or Noise is the modification of fields in a database while preserving the aggregate characteristics of that make the database useful in the first place.| 
-| List-based Access Control | List Based Access Control associates a list of users and their privileges with each object.| +|Jump Bag|A Jump Bag is a container that has all the items necessary to respond to an incident inside to help mitigate the effects of delayed reactions.| 
-| LKM (Loadable Kernel Modules| Loadable Kernel Modules allow for the adding of additional functionality directly into the kernel while the system is running.| +|Kerberos|A system developed at the Massachusetts Institute of Technology that depends on passwords and symmetric cryptography (DES) to implement ticket-based, peer entity authentication service and access control service distributed in a client-server network environment.| 
-| Loadable Kernel Modules (LKM) | Loadable Kernel Modules allow for the adding of additional functionality directly into the kernel while the system is running.| +|Kernel|The essential centre of a computer operating system, the core that provides basic services for all other parts of the operating system.  A synonym is nucleus.  A kernel can be contrasted with a shell, the outermost part of an operating system that interacts with user commands.  Kernel and shell are terms used more frequently in Unix and some other operating systems than in IBM mainframe systems.| 
-| Log Clipping | Log clipping is the selective removal of log entries from a system log to hide a compromise.| +|KYC|Know Your Customer.| 
-| Logic Bombs | Logic bombs are programs or snippets of code that execute when a certain predefined event occurs.  Logic bombs may also be set to go off on a certain date or when a specified set of circumstances occurs.| +|L2F|Layer 2 Forwarding Protocol).| 
-| Logic Gate | A logic gate is an elementary building block of a digital circuit.  Most logic gates have two inputs and one output.  As digital circuits can only understand binary, inputs and outputs can assume only one of two states, 0 or 1.| +|:::|An Internet protocol (originally developed by Cisco Corporation) that uses tunnelling of PPP over IP to create a virtual extension of a dial-up link across a network, initiated by the dial-up server and transparent to the dial-up user.| 
-| Loopback Address | The loopback address (127.0.0.1) is a pseudo IP address that always refer back to the local host and are never sent out onto a network.| +|L2FP|Layer 2 Tunneling Protocol).| 
-| LTR | Large Transaction Report.| +|:::|An extension of the Point-to-Point Tunneling Protocol used by an Internet service provider to enable the operation of a virtual private network over the Internet.| 
-| MAC (Mandatory Access Control) | Mandatory Access Control controls is where the system controls access to resources based on classification levels assigned to both the objects and the users.  These controls cannot be changed by anyone.| +|Lattice Techniques|Lattice Techniques use security designations to determine access to information.| 
-| MAC Address | A physical address; a numeric value that uniquely identifies that network device from every other device on the planet.| +|Layer 2 Forwarding Protocol|L2F.  An Internet protocol (originally developed by Cisco Corporation) that uses tunneling of PPP over IP to create a virtual extension of a dial-up link across a network, initiated by the dial-up server and transparent to the dial-up user.| 
-| Malicious Code | Software (e.g., Trojan horse) that appears to perform a useful or desirable function, but actually gains unauthorized access to system resources or tricks a user into executing other malicious logic.| +|Layer 2 Tunneling Protocol|L2FP.  An extension of the Point-to-Point Tunneling Protocol used by an Internet service provider to enable the operation of a virtual private network over the Internet.| 
-| Malware | A generic term for a number of different types of malicious code.| +|Least Privilege|Least Privilege is the principle of allowing users or applications the least amount of permissions necessary to perform their intended function.| 
-| Mandatory Access Control (MAC) | Mandatory Access Control controls is where the system controls access to resources based on classification levels assigned to both the objects and the users.  These controls cannot be changed by anyone.| +|Legion|Software to detect unprotected shares.| 
-| Man in the Middle (MITM) Attack | In cryptography, the man-in-the-middle attack (often abbreviated MITM) attack, is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker.| +|Lightweight Directory Access Protocol|LDAP.  A software protocol for enabling anyone to locate organizations, individuals, and other resources such as files and devices in a network, whether on the public Internet or on a corporate Intranet.| 
-| Masquerade Attack | A type of attack in which one system entity illegitimately poses as (assumes the identity of) another entity.| +|Link State|With link state, routes maintain information about all routers and router-to-router links within a geographic area, and creates a table of best routes with that information.| 
-| MD5 | A one way cryptographic hash function.  Also see "hash functions" and "sha1".| +|List-based Access Control | List Based Access Control associates a list of users and their privileges with each object.| 
-| Measures of Effectiveness (MOE| Measures of Effectiveness is a probability model based on engineering concepts that allows one to approximate the impact a give action will have on an environment. In Information warfare it is the ability to attack or defend within an Internet environment.| +|LKM|Loadable Kernel Modules.| 
-| MFT | Managed File Transfer.| +|:::|Loadable Kernel Modules allow for the adding of additional functionality directly into the kernel while the system is running.| 
-| MI | Management Information.| +|Loadable Kernel Modules|LKM.  Loadable Kernel Modules allow for the adding of additional functionality directly into the kernel while the system is running.| 
-| MITM (Man in the Middle) Attack | In cryptography, the man-in-the-middle attack (often abbreviated MITM) attack, is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker.| +|Log Clipping|Log clipping is the selective removal of log entries from a system log to hide a compromise.| 
-| MOE (Measures of Effectiveness) | Measures of Effectiveness is a probability model based on engineering concepts that allows one to approximate the impact a give action will have on an environment. In Information warfare it is the ability to attack or defend within an Internet environment.| +|Logic Bombs|Logic bombs are programs or snippets of code that execute when a certain predefined event occurs.  Logic bombs may also be set to go off on a certain date or when a specified set of circumstances occurs.| 
-| Monoculture | Monoculture is the case where a large number of users run the same software, and are vulnerable to the same attacks.| +|Logic Gate|A logic gate is an elementary building block of a digital circuit.  Most logic gates have two inputs and one output.  As digital circuits can only understand binary, inputs and outputs can assume only one of two states, 0 or 1.| 
-| Morris Worm | A worm program written by Robert T. Morris, Jr. that flooded the ARPANET in November, 1988, causing problems for thousands of hosts.| +|Loopback Address | The loopback address (127.0.0.1) is a pseudo IP address that always refer back to the local host and are never sent out onto a network.| 
-| MoSCoW | Must, Should, Could, Would.| +|LTR|Large Transaction Report.| 
-| Mule | Also known as a money mule, a mule is an individual who transfers stolen money or merchandise either in person, through a courier service or electronically to help obscure a scammer’s identity and/or location.  Mules often are, or at least claim to be, unaware that the money or merchandise they are transferring is stolen.| +|MAC|Mandatory Access Control).| 
-| Multi-Cast | Broadcasting from one host to a given set of hosts.| +|:::|Mandatory Access Control controls is where the system controls access to resources based on classification levels assigned to both the objects and the users.  These controls cannot be changed by anyone.| 
-| Multi-Homed | You are "multi-homed" if your network is directly connected to two or more ISP's.| +|MAC Address|A physical address; a numeric value that uniquely identifies that network device from every other device on the planet.| 
-| Multiplexing | To combine multiple signals from possibly disparate sources, in order to transmit them over a single path.| +|Malicious Code|Software (e.g., Trojan horse) that appears to perform a useful or desirable function, but actually gains unauthorized access to system resources or tricks a user into executing other malicious logic.| 
-| NAT (Network Address Translation) | It is used to share one or a small number of publicly routable IP addresses among a larger number of hosts.  The hosts are assigned private IP addresses, which are then "translated" into one of the publicly routed IP addresses.  Typically home or small business networks use NAT to share a single DLS or Cable modem IP address.  However, in some cases NAT is used for servers as an additional layer of protection.| +|Malware|A generic term for a number of different types of malicious code.| 
-| National Institute of Standards and Technology (NIST) | National Institute of Standards and Technology, a unit of the US Commerce Department.  Formerly known as the National Bureau of Standards, NIST promotes and maintains measurement standards.  It also has active programs for encouraging and assisting industry and science to develop and use these standards.| +|Mandatory Access Control|MAC.  Mandatory Access Control controls is where the system controls access to resources based on classification levels assigned to both the objects and the users.  These controls cannot be changed by anyone.| 
-| Natural Disaster | Any "act of God" (e.g., fire, flood, earthquake, lightning, or wind) that disables a system component.| +|Man in the Middle Attack|MITM.| 
-| Netmask | 32-bit number indicating the range of IP addresses residing on a single IP network/subnet/supernet.  This specification displays network masks as hexadecimal numbers.  For example, the network mask for a class C IP network is displayed as 0xffffff00.  Such a mask is often displayed elsewhere in the literature as 255.255.255.0.| +|:::|In cryptography, the man-in-the-middle attack (often abbreviated MITM) attack, is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker.| 
-| Network Address Translation (NAT) | The translation of an Internet Protocol address used within one network to a different IP address known within another network.  One network is designated the inside network and the other is the outside.| +|Masquerade Attack|A type of attack in which one system entity illegitimately poses as (assumes the identity of) another entity.| 
-| Network-based IDS | A network-based IDS system monitors the traffic on its network segment as a data source.  This is generally accomplished by placing the network interface card in promiscuous mode to capture all network traffic that crosses its network segment.  Network traffic on other segments, and traffic on other means of communication (like phone lines) can't be monitored. Network-based IDS involves looking at the packets on the network as they pass by some sensor.  The sensor can only see the packets that happen to be carried on the network segment it's attached to. Packets are considered to be of interest if they match a signature.Network-based intrusion detection passively monitors network activity for indications of attacks.  Network monitoring offers several advantages over traditional host-based intrusion detection systems.  Because many intrusions occur over networks at some point, and because networks are increasingly becoming the targets of attack, these techniques are an excellent method of detecting many attacks which may be missed by host-based intrusion detection mechanisms.| +|MD5|A one way cryptographic hash function.  Also see "hash functions" and "sha1".| 
-| Network Mapping | To compile an electronic inventory of the systems and the services on your network.| +|Measures of Effectiveness|MOE.| 
-| Network Taps | Network taps are hardware devices that hook directly onto the network cable and send a copy of the traffic that passes through it to one or more other networked devices.| +|:::|Measures of Effectiveness is a probability model based on engineering concepts that allows one to approximate the impact a give action will have on an environment. In Information warfare it is the ability to attack or defend within an Internet environment.| 
-| Newsgroup | Newsgroup is the name for a discussion group or chat room.| +|MFT|Managed File Transfer.| 
-| Nginx | Nginx Web Server.  Nginx is a secure, fast and efficient web server.| +|MI|Management Information.| 
-| Node | Node is any single device connected to a Network.| +|MITM Attack|Man in the Middle.| 
-| Non FCT | Non Functional Testing.  Testing the application against client and performance requirements; including Load and Performance Testing, Ergonomics Testing, Stress and Volume Testing, Compatibility and Migration Testing, Data Conversion Testing, Security and Penetration Testing, Operational Readiness Testing, Installation Testing, Security Testing (Application Security, Network Security, System Security).| +|:::|In cryptography, the man-in-the-middle attack (often abbreviated MITM) attack, is a form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker.| 
-| Non-printable character | A character that doesn't have a corresponding character letter to its corresponding ASCII code.  Examples would be the Linefeed, which is ASCII character code 10 decimal, the Carriage Return, which is 13 decimal, or the bell sound, which is decimal 7.  On a PC, you can often add non-printable characters by holding down the Alt key, and typing in the decimal value (i.e., Alt-007 gets you a bell).  There are other character encoding schemes, but ASCII is the most prevalent.| +|MOE|Measures of Effectiveness).| 
-| Non-repudiation | Non-repudiation is the ability for a system to prove that a specific user and only that specific user sent a message and that it hasn't been modified.| +|:::|Measures of Effectiveness is a probability model based on engineering concepts that allows one to approximate the impact a give action will have on an environment. In Information warfare it is the ability to attack or defend within an Internet environment.| 
-| Null Session | Known as Anonymous Logon, it is a way of letting an anonymous user retrieve information such as user names and shares over the network or connect without authentication. It is used by applications such as explorer.exe to enumerate shares on remote servers.| +|Monoculture|Monoculture is the case where a large number of users run the same software, and are vulnerable to the same attacks.| 
-| OAT | Operational Acceptance Testing.  An assessment of the risk that the released solution will not meet the target availbility levels in the production environment.  Areas to consider should include Deployment, Back out or Rollback, Failover and Resilience, Disaster Recovery, Backup and Restore, Alerting and Monitoring, Security, Batch Scheduling.|+|Morris Worm|A worm program written by Robert T. Morris, Jr. that flooded the ARPANET in November, 1988, causing problems for thousands of hosts.| 
 +|MoSCoW | Must, Should, Could, Would.| 
 +|Mule|Also known as a money mule, a mule is an individual who transfers stolen money or merchandise either in person, through a courier service or electronically to help obscure a scammer’s identity and/or location.  Mules often are, or at least claim to be, unaware that the money or merchandise they are transferring is stolen.| 
 +|Multi-Cast|Broadcasting from one host to a given set of hosts.| 
 +|Multi-Homed|You are "multi-homed" if your network is directly connected to two or more ISP's.| 
 +|Multiplexing|To combine multiple signals from possibly disparate sources, in order to transmit them over a single path.| 
 +|NAT|Network Address Translation).| 
 +|:::|It is used to share one or a small number of publicly routable IP addresses among a larger number of hosts.  The hosts are assigned private IP addresses, which are then "translated" into one of the publicly routed IP addresses.  Typically home or small business networks use NAT to share a single DLS or Cable modem IP address.  However, in some cases NAT is used for servers as an additional layer of protection.| 
 +|National Institute of Standards and Technology|NIST.  National Institute of Standards and Technology, a unit of the US Commerce Department.  Formerly known as the National Bureau of Standards, NIST promotes and maintains measurement standards.  It also has active programs for encouraging and assisting industry and science to develop and use these standards.| 
 +|Natural Disaster|Any "act of God" (e.g., fire, flood, earthquake, lightning, or wind) that disables a system component.| 
 +|Netmask|32-bit number indicating the range of IP addresses residing on a single IP network/subnet/supernet.  This specification displays network masks as hexadecimal numbers.  For example, the network mask for a class C IP network is displayed as 0xffffff00.  Such a mask is often displayed elsewhere in the literature as 255.255.255.0.| 
 +|Network Address Translation|NAT.  The translation of an Internet Protocol address used within one network to a different IP address known within another network.  One network is designated the inside network and the other is the outside.| 
 +|Network-based IDS|A network-based IDS system monitors the traffic on its network segment as a data source.  This is generally accomplished by placing the network interface card in promiscuous mode to capture all network traffic that crosses its network segment.  Network traffic on other segments, and traffic on other means of communication (like phone lines) can't be monitored. Network-based IDS involves looking at the packets on the network as they pass by some sensor.  The sensor can only see the packets that happen to be carried on the network segment it's attached to. Packets are considered to be of interest if they match a signature.Network-based intrusion detection passively monitors network activity for indications of attacks.  Network monitoring offers several advantages over traditional host-based intrusion detection systems.  Because many intrusions occur over networks at some point, and because networks are increasingly becoming the targets of attack, these techniques are an excellent method of detecting many attacks which may be missed by host-based intrusion detection mechanisms.| 
 +|Network Mapping|To compile an electronic inventory of the systems and the services on your network.| 
 +|Network Taps|Network taps are hardware devices that hook directly onto the network cable and send a copy of the traffic that passes through it to one or more other networked devices.| 
 +|Newsgroup|Newsgroup is the name for a discussion group or chat room.| 
 +|Nginx|Nginx Web Server.  Nginx is a secure, fast and efficient web server.| 
 +|Node|Node is any single device connected to a Network.| 
 +|Non FCT|Non Functional Testing.  Testing the application against client and performance requirements; including Load and Performance Testing, Ergonomics Testing, Stress and Volume Testing, Compatibility and Migration Testing, Data Conversion Testing, Security and Penetration Testing, Operational Readiness Testing, Installation Testing, Security Testing (Application Security, Network Security, System Security).| 
 +|Non-printable character|A character that doesn't have a corresponding character letter to its corresponding ASCII code.  Examples would be the Linefeed, which is ASCII character code 10 decimal, the Carriage Return, which is 13 decimal, or the bell sound, which is decimal 7.  On a PC, you can often add non-printable characters by holding down the Alt key, and typing in the decimal value (i.e., Alt-007 gets you a bell).  There are other character encoding schemes, but ASCII is the most prevalent.| 
 +|Non-repudiation|Non-repudiation is the ability for a system to prove that a specific user and only that specific user sent a message and that it hasn't been modified.| 
 +|Null Session|Known as Anonymous Logon, it is a way of letting an anonymous user retrieve information such as user names and shares over the network or connect without authentication. It is used by applications such as explorer.exe to enumerate shares on remote servers.| 
 +|OAT|Operational Acceptance Testing.  An assessment of the risk that the released solution will not meet the target availbility levels in the production environment.  Areas to consider should include Deployment, Back out or Rollback, Failover and Resilience, Disaster Recovery, Backup and Restore, Alerting and Monitoring, Security, Batch Scheduling.|
 |Octet|A sequence of eight bits.  An octet is an eight-bit byte.| |Octet|A sequence of eight bits.  An octet is an eight-bit byte.|
 |One-way Encryption|Irreversible transformation of plain-text to cipher text, such that the plain-text cannot be recovered from the cipher text by other than exhaustive procedures even if the cryptographic key is known.| |One-way Encryption|Irreversible transformation of plain-text to cipher text, such that the plain-text cannot be recovered from the cipher text by other than exhaustive procedures even if the cryptographic key is known.|
Line 514: Line 566:
 |:::|A proof of concept is realisation of a certain method or idea to demonstrate its feasibility, or a demonstration in principle, whose purpose is to verify that some concept or theory is probably capable of being useful.  A proof-of-concept may or may not be complete, and is usually small and incomplete.  In computer security the term is often used as a synonym for a zero-day exploit which, mainly for its early creation, does not take full advantage over some vulnerability.| |:::|A proof of concept is realisation of a certain method or idea to demonstrate its feasibility, or a demonstration in principle, whose purpose is to verify that some concept or theory is probably capable of being useful.  A proof-of-concept may or may not be complete, and is usually small and incomplete.  In computer security the term is often used as a synonym for a zero-day exploit which, mainly for its early creation, does not take full advantage over some vulnerability.|
 |POC|Point of Contact.| |POC|Point of Contact.|
-|Point-to-Point|PPP.  A protocol for communication between two computers using a serial interface, typically a personal computer connected by phone line to a server.  It packages your computer's TCP/IP packets and forwards them to the server where they can actually be put on the Internet.|+|Point-to-Point|PPP.
 +|:::|A protocol for communication between two computers using a serial interface, typically a personal computer connected by phone line to a server.  It packages your computer's TCP/IP packets and forwards them to the server where they can actually be put on the Internet.|
 |Point-to-Point Tunneling Protocol|PPTP.  A protocol (set of communication rules) that allows corporations to extend their own corporate network through private "tunnels" over the public Internet.| |Point-to-Point Tunneling Protocol|PPTP.  A protocol (set of communication rules) that allows corporations to extend their own corporate network through private "tunnels" over the public Internet.|
 |Poison Reverse|Split horizon with poisoned reverse (more simply, poison reverse) does include such routes in updates, but sets their metrics to infinity. In effect, advertising the fact that there routes are not reachable.| |Poison Reverse|Split horizon with poisoned reverse (more simply, poison reverse) does include such routes in updates, but sets their metrics to infinity. In effect, advertising the fact that there routes are not reachable.|
-|Polyinstantiation | Polyinstantiation is the ability of a database to maintain multiple records with the same key. It is used to prevent inference attacks.| +|Polyinstantiation|Polyinstantiation is the ability of a database to maintain multiple records with the same key. It is used to prevent inference attacks.| 
-|Polymorphism | Polymorphism is the process by which malicious software changes its underlying code to avoid detection.|+|Polymorphism|Polymorphism is the process by which malicious software changes its underlying code to avoid detection.|
 |POP3|Post Office Protocol Version 3).| |POP3|Post Office Protocol Version 3).|
 |:::|An Internet Standard protocol by which a client workstation can dynamically access a mailbox on a server host to retrieve mail messages that the server has received and is holding for the client.| |:::|An Internet Standard protocol by which a client workstation can dynamically access a mailbox on a server host to retrieve mail messages that the server has received and is holding for the client.|
Line 590: Line 643:
 |RPC Scans|RPC scans determine which RPC services are running on a machine.| |RPC Scans|RPC scans determine which RPC services are running on a machine.|
 |RSS|Really Simple Syndication.| |RSS|Really Simple Syndication.|
-|:::|RSS is a family of web feed formats used to publish frequently updated works such as blog entries, news headlines, audio, and video in a standardised format.  An RSS document (which is called a “feed”, “web feed” or “channel”) includes full or summarized text, plus metadata such as publishing dates and authorship.  Web feeds benefit publishers by letting them syndicate content automatically.  They benefit readers who want to subscribe to timely updates from favoured websites or to aggregate feeds from many sites into one place.|+|:::|RSS is a family of web feed formats used to publish frequently updated works such as blog entries, news headlines, audio, and video in a standardised format.  An RSS document (which is called a “feed”, “web feed” or “channel”) includes full or summarized text, plus metadata such as publishing dates and authorship.  Web feeds benefit publishers by letting them syndicate content automatically.  They benefit readers who want to subscribe to timely updates from favored websites or to aggregate feeds from many sites into one place.|
 |RTM|Requirements Traceability Matrix.  To link each requirement from a BRD to a function, Display the owner of the function, Provide the section of the FSD where each function is described, Make clear any requirements that are out-of-scope for the FSD, Ensure all requirements can be traced from the BRD through to the FSD, Display the MoSCoW qualifier for each requirement in the BRD, Enable all FSD owners to discuss and agree as to where solutions should reside and what they should look like.| |RTM|Requirements Traceability Matrix.  To link each requirement from a BRD to a function, Display the owner of the function, Provide the section of the FSD where each function is described, Make clear any requirements that are out-of-scope for the FSD, Ensure all requirements can be traced from the BRD through to the FSD, Display the MoSCoW qualifier for each requirement in the BRD, Enable all FSD owners to discuss and agree as to where solutions should reside and what they should look like.|
-|RTQ|Risk Tollerance Questionaire.|+|RTQ|Risk Tolerance Questionnaire.|
 |Rule Set Based Access Control|RSBAC.| |Rule Set Based Access Control|RSBAC.|
 |:::|Rule Set Based Access Control targets actions based on rules for entities operating on objects.| |:::|Rule Set Based Access Control targets actions based on rules for entities operating on objects.|
Line 739: Line 792:
 |UAT|User Acceptance Testing.| |UAT|User Acceptance Testing.|
 |UDF|User Defined Field.| |UDF|User Defined Field.|
-|UDP|User Datagram Protocol)|+|UDP|User Datagram Protocol|
 |:::|A communications protocol that, like TCP, runs on top of IP networks.  Unlike TCP/IP, UDP/IP provides very few error recovery services, offering instead a direct way to send and receive datagrams over an IP network.  It's used primarily for broadcasting messages over a network.  UDP uses the Internet Protocol to get a datagram from one computer to another but does not divide a message into packets (datagrams) and reassemble it at the other end.  Specifically, UDP doesn't provide sequencing of the packets that the data arrives in.| |:::|A communications protocol that, like TCP, runs on top of IP networks.  Unlike TCP/IP, UDP/IP provides very few error recovery services, offering instead a direct way to send and receive datagrams over an IP network.  It's used primarily for broadcasting messages over a network.  UDP uses the Internet Protocol to get a datagram from one computer to another but does not divide a message into packets (datagrams) and reassemble it at the other end.  Specifically, UDP doesn't provide sequencing of the packets that the data arrives in.|
 |UDP Scan|UDP scans perform scans to determine which UDP ports are open.| |UDP Scan|UDP scans perform scans to determine which UDP ports are open.|
Line 786: Line 839:
 |Windowing|A windowing system is a system for sharing a computer's graphical display presentation resources among multiple applications at the same time.  In a computer that has a graphical user interface (GUI), you may want to use a number of applications at the same time (this is called task).  Using a separate window for each application, you can interact with each application and go from one application to another without having to reinitiate it.  Having different information or activities in multiple windows may also make it easier for you to do your work.  A windowing system uses a window manager to keep track of where each window is located on the display screen and its size and status.  A windowing system doesn't just manage the windows but also other forms of graphical user interface entities.| |Windowing|A windowing system is a system for sharing a computer's graphical display presentation resources among multiple applications at the same time.  In a computer that has a graphical user interface (GUI), you may want to use a number of applications at the same time (this is called task).  Using a separate window for each application, you can interact with each application and go from one application to another without having to reinitiate it.  Having different information or activities in multiple windows may also make it easier for you to do your work.  A windowing system uses a window manager to keep track of where each window is located on the display screen and its size and status.  A windowing system doesn't just manage the windows but also other forms of graphical user interface entities.|
 |Windump|Windump is a freeware tool for Windows that is a protocol analyzer that can monitor network traffic on a wire.| |Windump|Windump is a freeware tool for Windows that is a protocol analyzer that can monitor network traffic on a wire.|
-|Wired Equivalent Privacy|WEP.  A security protocol for wireless local area networks defined in the standard IEEE 802.11b.|+|Wired Equivalent Privacy|WEP.
 +|:::|A security protocol for wireless local area networks defined in the standard IEEE 802.11b.|
 |Wireless Application Protocol|A specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access, including e-mail, the World Wide Web, newsgroups, and Internet Relay Chat.| |Wireless Application Protocol|A specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access, including e-mail, the World Wide Web, newsgroups, and Internet Relay Chat.|
 |Wiretapping|Monitoring and recording data that is flowing between two points in a communication system.| |Wiretapping|Monitoring and recording data that is flowing between two points in a communication system.|
-|World Wide Web Consortium|W3C. The W3C is an international organization that develops Web standards.| +|World Wide Web Consortium|W3C.
-|World Wide Web|WWW.  Also known as "THE WEB" or W3.|+|:::|The W3C is an international organization that develops Web standards.| 
 +|World Wide Web|WWW.
 +|:::|Also known as "THE WEB" or W3.|
 |Worm|A computer program that can run independently, can propagate a complete working version of itself onto other hosts on a network, and may consume computer resources destructively.| |Worm|A computer program that can run independently, can propagate a complete working version of itself onto other hosts on a network, and may consume computer resources destructively.|
 |WWW|World Wide Web.| |WWW|World Wide Web.|
glossary/start.1689608072.txt.gz · Last modified: 2023/07/17 15:34 by peter

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki