glossary:start
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
glossary:start [2023/07/17 15:19] – peter | glossary:start [2023/07/17 15:57] (current) – peter | ||
---|---|---|---|
Line 19: | Line 19: | ||
|ACL|Access Control List. A list of permissions attached to an object.| | |ACL|Access Control List. A list of permissions attached to an object.| | ||
|Access Control|Access Control ensures that resources are only granted to those users who are entitled to them.| | |Access Control|Access Control ensures that resources are only granted to those users who are entitled to them.| | ||
- | |Access Control List|ACL. A list of permissions attached to an object.| | + | |Access Control List|ACL.| |
+ | |:::|A list of permissions attached to an object.| | ||
|Access Control Service|A security service that provides protection of system resources against unauthorized access. | |Access Control Service|A security service that provides protection of system resources against unauthorized access. | ||
|Access Matrix|An Access Matrix uses rows to represent subjects and columns to represent objects with privileges listed in each cell.| | |Access Matrix|An Access Matrix uses rows to represent subjects and columns to represent objects with privileges listed in each cell.| | ||
|Account Harvesting|The process of collecting all the legitimate account names on a system.| | |Account Harvesting|The process of collecting all the legitimate account names on a system.| | ||
|Active Content|Program code embedded in the contents of a web page. When the page is accessed by a web browser, the embedded code is automatically downloaded and executed on the user's workstation. Ex. Java, ActiveX (MS).| | |Active Content|Program code embedded in the contents of a web page. When the page is accessed by a web browser, the embedded code is automatically downloaded and executed on the user's workstation. Ex. Java, ActiveX (MS).| | ||
- | |Active Directory|AD. | + | |Active Directory|AD.| |
+ | |:::|A directory service implemented by Microsoft for Windows domain networks. | | ||
|Activity Monitors|Aim to prevent virus infection by monitoring for malicious activity on a system, and blocking that activity when possible.| | |Activity Monitors|Aim to prevent virus infection by monitoring for malicious activity on a system, and blocking that activity when possible.| | ||
|AD|Active Directory. | |AD|Active Directory. | ||
|ADAL| Authoritive Data Access Layer.| | |ADAL| Authoritive Data Access Layer.| | ||
- | |Address Resolution Protocol|ARP. | + | |Address Resolution Protocol|ARP.| |
- | |ADS| Authoritive Data Source.| | + | |:::|A protocol for mapping an Internet Protocol address to a physical machine address that is recognized in the local network. |
+ | |ADS|Authoritive Data Source.| | ||
|ADSL|Asymmetric Digital Subscriber Line (ADSL) is a technology for transmitting digital information at high bandwidth on existing phone lines to homes and businesses. | |ADSL|Asymmetric Digital Subscriber Line (ADSL) is a technology for transmitting digital information at high bandwidth on existing phone lines to homes and businesses. | ||
- | |Advanced Encryption Standard|AES. | + | |Advanced Encryption Standard|AES.| |
- | |AEOD | After End-of-Day.| | + | |:::|An encryption standard being developed by NIST. Intended to specify an unclassified, |
+ | |AEOD|After End-of-Day.| | ||
|AES|Advanced Encryption Standard. | |AES|Advanced Encryption Standard. | ||
- | |AIRB| Advanced Internal Rating Based Approach.| | + | |AIRB|Advanced Internal Rating Based Approach.| |
- | |A&L| Assets and Liabilities | | + | |A& |
- | |Algorithm| A finite set of step-by-step instructions for a problem-solving or computation procedure, especially one that can be implemented by a computer.| | + | |Algorithm|A finite set of step-by-step instructions for a problem-solving or computation procedure, especially one that can be implemented by a computer.| |
|AML|Anti money laundering (AML) is a term mainly used in the financial and legal industries to describe the legal controls that require financial institutions and other regulated entities to prevent or report money laundering activities.| | |AML|Anti money laundering (AML) is a term mainly used in the financial and legal industries to describe the legal controls that require financial institutions and other regulated entities to prevent or report money laundering activities.| | ||
|AMSC|Application Management Service Centre.| | |AMSC|Application Management Service Centre.| | ||
Line 49: | Line 53: | ||
|:::|A globally unique number assigned by a registrar for the purposes of Internet routing, | | |:::|A globally unique number assigned by a registrar for the purposes of Internet routing, | | ||
|Asymmetric Cryptography|Public-key cryptography. | |Asymmetric Cryptography|Public-key cryptography. | ||
- | |Asymmetric Warfare | Asymmetric warfare is the application of dissimilar strategies, tactics, capabilities and approaches used to circumvent or negate an opponent' | + | |Asymmetric Warfare|Asymmetric warfare is the application of dissimilar strategies, tactics, capabilities and approaches used to circumvent or negate an opponent' |
|Auditing|The information gathering and analysis of assets to ensure such things as policy compliance and security from vulnerabilities.| | |Auditing|The information gathering and analysis of assets to ensure such things as policy compliance and security from vulnerabilities.| | ||
|Asymmetric Digital Subscriber Line|ADSL.| | |Asymmetric Digital Subscriber Line|ADSL.| | ||
Line 61: | Line 65: | ||
|Authorization|The approval, permission, or empowerment for someone or something to do something.| | |Authorization|The approval, permission, or empowerment for someone or something to do something.| | ||
|Autonomous System|One network or series of networks that are all under one administrative control. | |Autonomous System|One network or series of networks that are all under one administrative control. | ||
- | |Autonomous System Number|ASN. | + | |Autonomous System Number|ASN.| |
+ | |:::|A globally unique number assigned by a registrar for the purposes of Internet routing.| | ||
|Availability|The need to ensure that the business purpose of the system can be met and that it is accessible to those who need to use it.| | |Availability|The need to ensure that the business purpose of the system can be met and that it is accessible to those who need to use it.| | ||
|Backdoor|A backdoor is a tool installed after a compromise to give an attacker easier access to the compromised system around any security mechanisms that are in place.| | |Backdoor|A backdoor is a tool installed after a compromise to give an attacker easier access to the compromised system around any security mechanisms that are in place.| | ||
Line 67: | Line 72: | ||
|Banner|A banner is the information that is displayed to a remote user trying to connect to a service. | |Banner|A banner is the information that is displayed to a remote user trying to connect to a service. | ||
|BAP|Business and Personal.| | |BAP|Business and Personal.| | ||
- | |Basic Authentication | Basic Authentication is the simplest web-based authentication scheme that works by sending the username and password with each request.| | + | |Basic Authentication|Basic Authentication is the simplest web-based authentication scheme that works by sending the username and password with each request.| |
|Bastion Host|A bastion host has been hardened in anticipation of vulnerabilities that have not been discovered yet.| | |Bastion Host|A bastion host has been hardened in anticipation of vulnerabilities that have not been discovered yet.| | ||
|BAU|Business as Usual.| | |BAU|Business as Usual.| | ||
- | |BBS|A Bulletin Board System (BBS) is a computerized meeting and announcement system that allows people to carry on discussions, | + | |BBS|Bulletin Board System.| |
+ | |:::|A Bulletin Board System (BBS) is a computerized meeting and announcement system that allows people to carry on discussions, | ||
|BCM|Business Continuity Management. The management of a Business Continuity Plan (BCP).| | |BCM|Business Continuity Management. The management of a Business Continuity Plan (BCP).| | ||
|BCP|Business Continuity Plan. A Business Continuity Plan is the plan for emergency response, backup operations, and post-disaster recovery steps that will ensure the availability of critical resources and facilitate the continuity of operations in an emergency situation.| | |BCP|Business Continuity Plan. A Business Continuity Plan is the plan for emergency response, backup operations, and post-disaster recovery steps that will ensure the availability of critical resources and facilitate the continuity of operations in an emergency situation.| | ||
Line 88: | Line 94: | ||
|BLoR|Business List of Records. | |BLoR|Business List of Records. | ||
|BOM|Business Only Membership.| | |BOM|Business Only Membership.| | ||
- | |Border Gateway Protocol|BGP. | + | |Border Gateway Protocol|BGP.| |
+ | |:::|An inter-autonomous system routing protocol. | ||
|Boot Record Infector|A boot record infector is a piece of malware that inserts malicious code into the boot sector of a disk.| | |Boot Record Infector|A boot record infector is a piece of malware that inserts malicious code into the boot sector of a disk.| | ||
|Bot|Also called ‘Internet bots’; refers to computers that perform tasks without human input. | |Bot|Also called ‘Internet bots’; refers to computers that perform tasks without human input. | ||
Line 102: | Line 109: | ||
|Brute Force|A crypto-analysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, | |Brute Force|A crypto-analysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, | ||
|BSM|Balance Sheet Management.| | |BSM|Balance Sheet Management.| | ||
- | |BSS 7799|British Standard 7799. A standard code of practice and provides guidance on how to secure an information system. | + | |BSS 7799|British Standard 7799.| |
+ | |:::|A standard code of practice and provides guidance on how to secure an information system. | ||
|BST|British Summer Time.| | |BST|British Summer Time.| | ||
|Buffer Overflow|A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting or overwriting the valid data held in them.| | |Buffer Overflow|A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting or overwriting the valid data held in them.| | ||
|Bullet-proof hosting|Bullet-proof hosting is a service provided by some domain hosting or web hosting firms that allow their customer considerable leniency in the kinds of material they may upload and distribute. | |Bullet-proof hosting|Bullet-proof hosting is a service provided by some domain hosting or web hosting firms that allow their customer considerable leniency in the kinds of material they may upload and distribute. | ||
- | |Bulletin Board System|A Bulletin Board System (BBS) is a computerized meeting and announcement system that allows people to carry on discussions, | + | |Bulletin Board System|BBS| |
- | |Business Continuity Management|BCM. The management of a Business Continuity Plan (BCP).| | + | |:::|A Bulletin Board System (BBS) is a computerized meeting and announcement system that allows people to carry on discussions, |
- | |Business Continuity Plan|BCP. | + | |Business Continuity Management|BCM.| |
- | |Business Impact Analysis|BIA. | + | |:::|The management of a Business Continuity Plan (BCP).| |
+ | |Business Continuity Plan|BCP.| | ||
+ | |:::|A Business Continuity Plan is the plan for emergency response, backup operations, and post-disaster recovery steps that will ensure the availability of critical resources and facilitate the continuity of operations in an emergency situation.| | ||
+ | |Business Impact Analysis|BIA.| | ||
+ | |:::|A Business Impact Analysis determines what levels of impact to a system are tolerable.| | ||
|Business Intelligence|Business intelligence is now widely accepted as being concerned with information technology solutions for transforming the output from large data collections into Intelligence; | |Business Intelligence|Business intelligence is now widely accepted as being concerned with information technology solutions for transforming the output from large data collections into Intelligence; | ||
|BYOD|Bring Your Own Device.| | |BYOD|Bring Your Own Device.| | ||
Line 115: | Line 127: | ||
|CA|Certificate Authority.| | |CA|Certificate Authority.| | ||
|CAB|Change Advisory Board.| | |CAB|Change Advisory Board.| | ||
- | |CAC|Call Admission Control. | + | |CAC|Call Admission Control.| |
+ | |:::|The inspection and control all inbound and outbound voice network activity by a voice firewall based on user-defined policies.| | ||
|Cache|Pronounced cash, a special high-speed storage mechanism. | |Cache|Pronounced cash, a special high-speed storage mechanism. | ||
|Cache Cramming|Cache Cramming is the technique of tricking a browser to run cached Java code from the local disk, instead of the internet zone, so it runs with less restrictive permissions.| | |Cache Cramming|Cache Cramming is the technique of tricking a browser to run cached Java code from the local disk, instead of the internet zone, so it runs with less restrictive permissions.| | ||
|Cache Poisoning|Malicious or misleading data from a remote name server is saved [cached] by another name server. | |Cache Poisoning|Malicious or misleading data from a remote name server is saved [cached] by another name server. | ||
- | |Call Admission Control|CAC. | + | |Call Admission Control|CAC.| |
+ | |:::|The inspection and control all inbound and outbound voice network activity by a voice firewall based on user-defined policies.| | ||
|CAMS|Cash Management System.| | |CAMS|Cash Management System.| | ||
|Carding|Carding is a term used for a process to verify the validity of stolen card data. The thief presents the card information on a website that has real-time transaction processing. | |Carding|Carding is a term used for a process to verify the validity of stolen card data. The thief presents the card information on a website that has real-time transaction processing. | ||
|Cash-out|The aspect of a cybercrime operation where stolen electronic funds are finally withdrawn from the finance system in the form of hard cash, often perpetrated by the use of ‘money mules’.| | |Cash-out|The aspect of a cybercrime operation where stolen electronic funds are finally withdrawn from the finance system in the form of hard cash, often perpetrated by the use of ‘money mules’.| | ||
- | |CCO|Chief Controls Office. | + | |CCO|Chief Controls Office.| |
+ | |:::|The Chief Controls Office centralizes and increases the focus on maintaining and enhancing an effective control framework.| | ||
|CDC|Client Data Controls.| | |CDC|Client Data Controls.| | ||
|CDI|Client Data Interface.| | |CDI|Client Data Interface.| | ||
Line 175: | Line 190: | ||
|CRAID|Changes, | |CRAID|Changes, | ||
|Crawler|A crawler uses existing Internet search engines to carry out automatic search and retrieval of selected Information on behalf of a user. It may also be known as Web crawler.| | |Crawler|A crawler uses existing Internet search engines to carry out automatic search and retrieval of selected Information on behalf of a user. It may also be known as Web crawler.| | ||
- | |CRC|Cyclic Redundancy Check. | + | |CRC|Cyclic Redundancy Check.| |
+ | |:::|Sometimes called " | ||
|Criminal Forum|A forum, usually web based, devoted to the black market trading of stolen credit card details, stolen identity details and tools to commit computer offences.| | |Criminal Forum|A forum, usually web based, devoted to the black market trading of stolen credit card details, stolen identity details and tools to commit computer offences.| | ||
|CRON|Cron is a Unix application that runs jobs for users and administrators at scheduled times of the day.| | |CRON|Cron is a Unix application that runs jobs for users and administrators at scheduled times of the day.| | ||
Line 200: | Line 216: | ||
|DBC|Detailed Business Case.| | |DBC|Detailed Business Case.| | ||
|DCF|Data Control Framework.| | |DCF|Data Control Framework.| | ||
- | |DCO|Device Configuration Overlay. | + | |DCO|Device Configuration Overlay.| |
+ | |:::|A hidden part of a hard drive that is used by personal computer manufacturers to specify the configuration of a hard drive (regardless of its actual size) to present the same number of sectors to the BIOS and operating system.| | ||
|DCP|Demand Change Process.| | |DCP|Demand Change Process.| | ||
- | |DDOS|Distributed Denial of Service (DDOS) is an attack in which multiple systems flood the bandwidth or resources of a targeted system in an attempt to make it unavailable. | + | |DDOS|Distributed Denial of Service.| |
+ | |:::|Distributed Denial of Service (DDOS) is an attack in which multiple systems flood the bandwidth or resources of a targeted system in an attempt to make it unavailable. | ||
|Decapsulation | Decapsulation is the process of stripping off one layer' | |Decapsulation | Decapsulation is the process of stripping off one layer' | ||
|Decryption|Decryption is the process of transforming an encrypted message into its original plain-text.| | |Decryption|Decryption is the process of transforming an encrypted message into its original plain-text.| | ||
Line 208: | Line 226: | ||
|Defacement|Defacement is the method of modifying the content of a website in such a way that it becomes " | |Defacement|Defacement is the method of modifying the content of a website in such a way that it becomes " | ||
|Defense In-Depth|Defense In-Depth is the approach of using multiple layers of security to guard against failure of a single security component.| | |Defense In-Depth|Defense In-Depth is the approach of using multiple layers of security to guard against failure of a single security component.| | ||
- | |Demilitarized Zone|DMZ. | + | |Demilitarized Zone|DMZ.| |
+ | |:::|In computer security, in general a demilitarized zone (DMZ) or perimeter network is a network area (a sub-network) that sits between an organization' | ||
|Denial of Service|The prevention of authorized access to a system resource or the delaying of system operations and functions.| | |Denial of Service|The prevention of authorized access to a system resource or the delaying of system operations and functions.| | ||
|DES|Data Encryption Standard).| | |DES|Data Encryption Standard).| | ||
Line 217: | Line 236: | ||
|Digest Authentication|Digest Authentication allows a web client to compute MD5 hashes of the password to prove it has the password.| | |Digest Authentication|Digest Authentication allows a web client to compute MD5 hashes of the password to prove it has the password.| | ||
|Digital Certificate|A digital certificate is an electronic " | |Digital Certificate|A digital certificate is an electronic " | ||
- | |Digital Envelope| A digital envelope is an encrypted message with the encrypted session key.| | + | |Digital Envelope|A digital envelope is an encrypted message with the encrypted session key.| |
- | |Digital Signature| A digital signature is a hash of a message that uniquely identifies the sender of the message and proves the message hasn't changed since transmission. | | + | |Digital Signature|A digital signature is a hash of a message that uniquely identifies the sender of the message and proves the message hasn't changed since transmission. | |
- | |Digital Signature Algorithm|DSA. | + | |Digital Signature Algorithm|DSA.| |
- | |Digital Signature Standard|DSS. | + | |:::|An asymmetric cryptographic algorithm that produces a digital signature in the form of a pair of large numbers. |
+ | |Digital Signature Standard|DSS.| | ||
+ | |:::|The US Government standard that specifies the Digital Signature Algorithm (DSA), which involves asymmetric cryptography.| | ||
|Disassembly|The process of taking a binary program and deriving the source code from it.| | |Disassembly|The process of taking a binary program and deriving the source code from it.| | ||
- | |Disaster Recovery Plan|DRP. | + | |Disaster Recovery Plan|DRP.| |
- | |Discretionary Access Control|DAC. | + | |:::|A Disaster Recovery Plan is the process of recovery of IT systems in the event of a disruption or disaster.| |
+ | |Discretionary Access Control|DAC.| | ||
+ | |:::|Discretionary Access Control consists of something the user can manage, such as a document password.| | ||
|Dispensation|Temporary exclusion from Policy or Scope.| | |Dispensation|Temporary exclusion from Policy or Scope.| | ||
|Disruption|A circumstance or event that interrupts or prevents the correct operation of system services and functions.| | |Disruption|A circumstance or event that interrupts or prevents the correct operation of system services and functions.| | ||
|Distance Vector|Distance vectors measure the cost of routes to determine the best route to all known networks.| | |Distance Vector|Distance vectors measure the cost of routes to determine the best route to all known networks.| | ||
- | |Distributed Denial of Service|DDOS. Distributed Denial of Service (DDOS) is an attack in which multiple systems flood the bandwidth or resources of a targeted system in an attempt to make it unavailable. | + | |Distributed Denial of Service|DDOS.| |
+ | |:::|Distributed Denial of Service (DDOS) is an attack in which multiple systems flood the bandwidth or resources of a targeted system in an attempt to make it unavailable. | ||
|Distributed Scans|Distributed Scans are scans that use multiple source addresses to gather information.| | |Distributed Scans|Distributed Scans are scans that use multiple source addresses to gather information.| | ||
|DLL|Dynamic Link Library.| | |DLL|Dynamic Link Library.| | ||
Line 241: | Line 265: | ||
|Domain Hijacking|Domain hijacking is an attack by which an attacker takes over a domain by first blocking access to the domain' | |Domain Hijacking|Domain hijacking is an attack by which an attacker takes over a domain by first blocking access to the domain' | ||
|Domain Name|A domain name locates an organization or other entity on the Internet. | |Domain Name|A domain name locates an organization or other entity on the Internet. | ||
- | |Domain Name System|DNS. | + | |Domain Name System|DNS.| |
+ | |:::|The domain name system (DNS) is the way that Internet domain names are located and translated into Internet Protocol addresses. A domain name is a meaningful and easy-to-remember " | ||
|Download|To download is to retrieve Information from the Internet.| | |Download|To download is to retrieve Information from the Internet.| | ||
|DP|Discussion Paper.| | |DP|Discussion Paper.| | ||
Line 259: | Line 284: | ||
|DWB|Dispensation, | |DWB|Dispensation, | ||
|DX|Developer Experience.| | |DX|Developer Experience.| | ||
- | |Dynamic Link Library|DLL. | + | |Dynamic Link Library|DLL.| |
+ | |:::|A collection of small programs, any of which can be called when needed by a larger program that is running in the computer. | ||
|Dynamic Routing Protocol|Allows network devices to learn routes. Ex. RIP, EIGRP Dynamic routing occurs when routers talk to adjacent routers, informing each other of what networks each router is currently connected to. The routers must communicate using a routing protocol, of which there are many to choose from. The process on the router that is running the routing protocol, communicating with its neighbour routers, is usually called a routing daemon. | |Dynamic Routing Protocol|Allows network devices to learn routes. Ex. RIP, EIGRP Dynamic routing occurs when routers talk to adjacent routers, informing each other of what networks each router is currently connected to. The routers must communicate using a routing protocol, of which there are many to choose from. The process on the router that is running the routing protocol, communicating with its neighbour routers, is usually called a routing daemon. | ||
|E2E|End-to-End. | |E2E|End-to-End. | ||
Line 277: | Line 303: | ||
|EIN|Employee Identification Number.| | |EIN|Employee Identification Number.| | ||
|Electronic Commerce|Electronic Commerce, also known as e-Commerce, covers a range of activities under which businesses and their customers can carry out transactions electronically between computer systems. | |Electronic Commerce|Electronic Commerce, also known as e-Commerce, covers a range of activities under which businesses and their customers can carry out transactions electronically between computer systems. | ||
- | | Electronic Funds Transfer | + | |Electronic Funds Transfer|Electronic Funds Transfer |
- | | Emanations Analysis | Gaining direct knowledge of communicated data by monitoring and resolving a signal that is emitted by a system and that contains the data but is not intended to communicate the data.| | + | |Emanations Analysis|Gaining direct knowledge of communicated data by monitoring and resolving a signal that is emitted by a system and that contains the data but is not intended to communicate the data.| |
- | | Encapsulation | The inclusion of one data structure within another structure so that the first data structure is hidden for the time being.| | + | |Encapsulation|The inclusion of one data structure within another structure so that the first data structure is hidden for the time being.| |
- | | Encryption | Cryptographic transformation of data (called " | + | |Encryption|Cryptographic transformation of data (called " |
- | | EOD | End-of-Day.| | + | |EOD|End-of-Day.| |
- | | Ephemeral Port | Also called a transient port or a temporary port. Usually is on the client side. It is set up when a client application wants to connect to a server and is destroyed when the client application terminates. | + | |Ephemeral Port|Also called a transient port or a temporary port. Usually is on the client side. It is set up when a client application wants to connect to a server and is destroyed when the client application terminates. |
- | | Escrow Passwords | Escrow Passwords are passwords that are written down and stored in a secure location (like a safe) that are used by emergency personnel when privileged personnel are unavailable.| | + | |Escrow Passwords|Escrow Passwords are passwords that are written down and stored in a secure location (like a safe) that are used by emergency personnel when privileged personnel are unavailable.| |
- | | Espionage | Espionage is the use of illegal means (spying) to collect Information, | + | |Espionage|Espionage is the use of illegal means (spying) to collect Information, |
- | | Ethernet | The most widely-installed LAN technology. | + | |Ethernet|The most widely-installed LAN technology. |
- | | ETL | Extract, Transform, Load.| | + | |ETL|Extract, |
- | | EUDA | End User Developed Application.| | + | |EUDA|End User Developed Application.| |
- | | Event | An event is an observable occurrence in a system or network.| | + | |Event|An event is an observable occurrence in a system or network.| |
- | | EXCO | Executive Committee, Executive Council.| | + | |EXCO|Executive Committee, Executive Council.| |
- | | Exploit | A sequence of actions or a program that enables an individual to take advantage of, or exploit, a vulnerability or security weakness in a program or system.| | + | |Exploit|A sequence of actions or a program that enables an individual to take advantage of, or exploit, a vulnerability or security weakness in a program or system.| |
- | | Exponential Backoff Algorithm | An exponential backoff algorithm is used to adjust TCP timeout values on the fly so that network devices don't continue to timeout sending data over saturated links.| | + | |Exponential Backoff Algorithm|An exponential backoff algorithm is used to adjust TCP timeout values on the fly so that network devices don't continue to timeout sending data over saturated links.| |
- | | Exposure | A threat action whereby sensitive data is directly released to an unauthorized entity.| | + | |Exposure|A threat action whereby sensitive data is directly released to an unauthorized entity.| |
- | | Extended ACLS | Cisco. | + | |Extended ACLS|Cisco. |
- | | Extensible Authentication Protocol | + | |Extensible Authentication Protocol|EAP.| |
- | | Exterior Gateway Protocol | + | |:::|A framework that supports multiple, optional authentication mechanisms for PPP, including clear-text passwords, challenge-response, |
- | | Extranet | Extranet is that portion of an organization’s Intranet that is accessible by selected individuals (for example, collaborators, | + | |Exterior Gateway Protocol|EGP.| |
- | | False Rejects | False Rejects are when an authentication system fails to recognize a valid user.| | + | |:::|A protocol which distributes routing information to the routers which connect autonomous systems.| |
- | | Fast File System | The first major revision to the Unix file system, providing faster read access and faster (delayed, asynchronous) write access through a disk cache and better file system layout on disk. It uses inodes (pointers) and data blocks.| | + | |Extranet|Extranet is that portion of an organization’s Intranet that is accessible by selected individuals (for example, collaborators, |
- | | Fast Flux | Protection method used by botnets consisting of a continuous and fast change of the DNS records for a domain name through different IP addresses.| | + | |False Rejects|False Rejects are when an authentication system fails to recognize a valid user.| |
- | | FAT | Functional Acceptance Testing. | + | |Fast File System|The first major revision to the Unix file system, providing faster read access and faster (delayed, asynchronous) write access through a disk cache and better file system layout on disk. It uses inodes (pointers) and data blocks.| |
- | | Fault Line Attacks | Fault Line Attacks use weaknesses between interfaces of systems to exploit gaps in coverage.| | + | |Fast Flux|Protection method used by botnets consisting of a continuous and fast change of the DNS records for a domain name through different IP addresses.| |
- | | FCT | Functional Confidence Testing. | + | |FAT|Functional Acceptance Testing.| |
- | | File Transfer Protocol | + | |:::|See FCT.| |
- | | Filter | + | |Fault Line Attacks|Fault Line Attacks use weaknesses between interfaces of systems to exploit gaps in coverage.| |
- | | Filtering Router | An inter-network router that selectively prevents the passage of data packets according to a security policy. | + | |FCT|Functional Confidence Testing.| |
- | | Finger | A protocol to lookup user information on a given host. A Unix program that takes an e-mail address as input and returns information about the user who owns that e-mail address. | + | |:::|Functional testing covers Unit Testing, Smoke Testing, Sanity Testing, Intergration Testing (Top Down, Bottom Up), Interface and Useability Testing, System Testing, Regression Testing, Per User Acceptance Testing (Alpha and Beta), User Acceptance Testing, White Box and Black Box Testing, Globalization and Location Testing.| |
- | | Fingerprinting | Sending strange packets to a system in order to gauge how it responds to determine the operating system.| | + | |File Transfer Protocol|FTP. |
- | | Firewall | A logical or physical discontinuity in a network to prevent unauthorized access to data or resources.| | + | |Filter A filter is used to specify which packets will or will not be used. It can be used in sniffers to determine which packets get displayed, or by firewalls to determine which packets get blocked.| |
- | | Flooding | An attack that attempts to cause a failure in (especially, | + | |Filtering Router|An inter-network router that selectively prevents the passage of data packets according to a security policy. |
- | | Forest | A forest is a set of Active Directory domains that replicate their databases with each other.| | + | |Finger|A protocol to lookup user information on a given host. A Unix program that takes an e-mail address as input and returns information about the user who owns that e-mail address. |
- | | Fork Bomb | A Fork Bomb works by using the fork() call to create a new process which is a copy of the original. | + | |Fingerprinting|Sending strange packets to a system in order to gauge how it responds to determine the operating system.| |
- | | Form-based Authentication | Form-Based Authentication uses forms on a webpage to ask a user to input username and password information.| | + | |Firewall|A logical or physical discontinuity in a network to prevent unauthorized access to data or resources.| |
- | | Forward Lookup | Forward lookup uses an Internet domain name to find an IP address.| | + | |Flooding|An attack that attempts to cause a failure in (especially, |
- | | Forward Proxy | Forward Proxies are designed to be the server through which all requests are made.| | + | |Forest|A forest is a set of Active Directory domains that replicate their databases with each other.| |
- | | FQDN | Fully Qualified Domain Name. The name of the physical host including the domain name; and where necessary the name of the DNS alias or availability group listener the application uses to connect.| | + | |Fork Bomb|A Fork Bomb works by using the fork() call to create a new process which is a copy of the original. |
- | | Fragment Offset | The fragment offset field tells the sender where a particular fragment falls in relation to other fragments in the original larger packet.| | + | |Form-based Authentication|Form-Based Authentication uses forms on a webpage to ask a user to input username and password information.| |
- | | Fragment Overlap Attack | A TCP/IP Fragmentation Attack that is possible because IP allows packets to be broken down into fragments for more efficient transport across various media. | + | |Forward Lookup|Forward lookup uses an Internet domain name to find an IP address.| |
- | | Fragmentation | The process of storing a data file in several " | + | |Forward Proxy|Forward Proxies are designed to be the server through which all requests are made.| |
- | | Frames | Data that is transmitted between network points as a unit complete with addressing and necessary protocol control information. | + | |FQDN|Fully Qualified Domain Name. The name of the physical host including the domain name; and where necessary the name of the DNS alias or availability group listener the application uses to connect.| |
- | | FTP (File Transfer Protocol) | A TCP/IP protocol specifying the transfer of text or binary files across the network.| | + | |Fragment Offset|The fragment offset field tells the sender where a particular fragment falls in relation to other fragments in the original larger packet.| |
- | | Full Duplex | A type of duplex communications channel which carries data in both directions at once. Refers to the transmission of data in two directions simultaneously. | + | |Fragment Overlap Attack|A TCP/IP Fragmentation Attack that is possible because IP allows packets to be broken down into fragments for more efficient transport across various media. |
- | | Fully-Qualified Domain Name | A Fully-Qualified Domain Name is a server name with a hostname followed by the full domain name.| | + | |Fragmentation|The process of storing a data file in several " |
- | | Fuzzing | The use of special regression testing tools to generate out-of-spec input for an application in order to find security vulnerabilities. Also see " | + | |Frames|Data that is transmitted between network points as a unit complete with addressing and necessary protocol control information. |
- | | Gateway | A network point that acts as an entrance to another network.| | + | |FTP|File Transfer Protocol).| |
- | | GETHOSTBYADDR | The gethostbyaddr DNS query is when the address of a machine is known and the name is needed.| | + | |:::|A TCP/IP protocol specifying the transfer of text or binary files across the network.| |
- | | GETHOSTBYNAME | The gethostbyname DNS quest is when the name of a machine is known and the address is needed.| | + | |Full Duplex|A type of duplex communications channel which carries data in both directions at once. Refers to the transmission of data in two directions simultaneously. |
- | | GIS | Global Information Security.| | + | |Fully-Qualified Domain Name|A Fully-Qualified Domain Name is a server name with a hostname followed by the full domain name.| |
- | | GNU | GNU is a Unix-like operating system that comes with source code that can be copied, modified, and redistributed. | + | |Fuzzing|The use of special regression testing tools to generate out-of-spec input for an application in order to find security vulnerabilities. Also see " |
- | | GNUTELLA | An Internet file sharing utility. | + | |Gateway|A network point that acts as an entrance to another network.| |
- | | GTIS | Global Technology Infrastructure Group.| | + | |GETHOSTBYADDR|The gethostbyaddr DNS query is when the address of a machine is known and the name is needed.| |
- | | GW | Gateway.| | + | |GETHOSTBYNAME|The gethostbyname DNS quest is when the name of a machine is known and the address is needed.| |
- | | Hactivist | An activist who uses illegal or legally ambiguous digital tools or methods in pursuit of political ends; methods employed include web site defacements, | + | |GIS|Global Information Security.| |
- | | HAM | Hardware Asset Management.| | + | |GNU|GNU is a Unix-like operating system that comes with source code that can be copied, modified, and redistributed. |
- | | Hardening | Hardening is the process of identifying and fixing vulnerabilities on a system.| | + | |GNUTELLA|An Internet file sharing utility. |
- | | Hash Function | An algorithm that computes a value based on a data object thereby mapping the data object to a smaller data object.| | + | |GTIS|Global Technology Infrastructure Group.| |
- | | Hash Functions | (cryptographic) hash functions are used to generate a one way "check sum" for a larger text, which is not trivially reversed. | + | |GW|Gateway.| |
- | | Header | A header is the extra information in a packet that is needed for the protocol stack to process the packet.| | + | |Hactivist|An activist who uses illegal or legally ambiguous digital tools or methods in pursuit of political ends; methods employed include web site defacements, |
- | | Hijack Attack | A form of active wiretapping in which the attacker seizes control of a previously established communication association.| | + | |HAM|Hardware Asset Management.| |
- | | Honey Client | See Honeymonkey.| | + | |Hardening|Hardening is the process of identifying and fixing vulnerabilities on a system.| |
- | | Honey Pot | Programs that simulate one or more network services that you designate on your computer' | + | |Hash Function|An algorithm that computes a value based on a data object thereby mapping the data object to a smaller data object.| |
- | | Honeymonkey | Automated system simulating a user browsing websites. | + | |Hash Functions|(cryptographic) hash functions are used to generate a one way "check sum" for a larger text, which is not trivially reversed. |
- | | Hops | A hop is each exchange with a gateway a packet takes on its way to the destination.| | + | |Header|A header is the extra information in a packet that is needed for the protocol stack to process the packet.| |
- | | Host | Any computer that has full two-way access to other computers on the Internet. | + | |Hijack Attack|A form of active wiretapping in which the attacker seizes control of a previously established communication association.| |
- | | Host-based ID | Host-based intrusion detection systems use information from the operating system audit records to watch all operations occurring on the host that the intrusion detection software has been installed upon. These operations are then compared with a pre-defined security policy. | + | |Honey Client|See Honeymonkey.| |
- | | Host-Based Intrusion Detection | Host-based intrusion detection systems use information from the operating system audit records to watch all operations occurring on the host that the intrusion detection software has been installed upon. These operations are then compared with a pre-defined security policy. | + | |Honey Pot|Programs that simulate one or more network services that you designate on your computer' |
- | | Hot Disaster Recovery Site | It contains fully redundant hardware and software, with telecommunications, | + | |Honeymonkey|Automated system simulating a user browsing websites. |
- | | Hot Fix | A hot fix is a single, cumulative package that includes one or more files that are used to address a problem in a software product (i.e. a software bug). Typically, hot fixes are made to address a specific customer situation and are not rolled out across the organisation. | + | |Hops|A hop is each exchange with a gateway a packet takes on its way to the destination.| |
- | | HPA | Host Protected Area. Sometimes called the Hidden Protected Area is a section of a hard drive that is hidden or not normally visible to the operating system, and is often used by software or personal computer manufactorers for system recovery and the backup of system configuration data.| | + | |Host|Any computer that has full two-way access to other computers on the Internet. |
- | | HTML (Hypertext Markup Language) | The set of markup symbols or codes inserted in a file intended for display on a World Wide Web browser page.| | + | |Host-based ID|Host-based intrusion detection systems use information from the operating system audit records to watch all operations occurring on the host that the intrusion detection software has been installed upon. These operations are then compared with a pre-defined security policy. |
- | | HTTP (Hypertext Transfer Protocol) | The protocol in the Internet Protocol (IP) family used to transport hypertext documents across an internet.| | + | |Host-Based Intrusion Detection|Host-based intrusion detection systems use information from the operating system audit records to watch all operations occurring on the host that the intrusion detection software has been installed upon. These operations are then compared with a pre-defined security policy. |
- | | HTTP Proxy | An HTTP Proxy is a server that acts as a middleman in the communication between HTTP clients and servers.| | + | |Hot Disaster Recovery Site|It contains fully redundant hardware and software, with telecommunications, |
- | | HTTPS | When used in the first part of a URL (the part that precedes the colon and specifies an access scheme or protocol), this term specifies the use of HTTP enhanced by a security mechanism, which is usually SSL. | | + | |Hot Fix|A hot fix is a single, cumulative package that includes one or more files that are used to address a problem in a software product (i.e. a software bug). Typically, hot fixes are made to address a specific customer situation and are not rolled out across the organisation. |
- | | HUB | A hub is a network device that operates by repeating data that it receives on one port to all the other ports. | + | |HPA|Host Protected Area. Sometimes called the Hidden Protected Area is a section of a hard drive that is hidden or not normally visible to the operating system, and is often used by software or personal computer manufactorers for system recovery and the backup of system configuration data.| |
- | | Humint | + | |HTML|Hypertext Markup Language. |
- | | Hybrid Attack | A Hybrid Attack builds on the dictionary attack method by adding numerals and symbols to dictionary words.| | + | |HTTP|Hypertext Transfer Protocol. |
- | | Hybrid Encryption | An application of cryptography that combines two or more encryption algorithms, particularly a combination of symmetric and asymmetric encryption.| | + | |HTTP Proxy|An HTTP Proxy is a server that acts as a middleman in the communication between HTTP clients and servers.| |
- | | Hyperlink | In hypertext or hypermedia, an information object (such as a word, a phrase, or an image; usually highlighted by color or underscoring) that points (indicates how to connect) to related information that is located elsewhere and can be retrieved by activating the link.| | + | |HTTPS|When used in the first part of a URL (the part that precedes the colon and specifies an access scheme or protocol), this term specifies the use of HTTP enhanced by a security mechanism, which is usually SSL. | |
- | | Hypertext Markup Language | + | |HUB|A hub is a network device that operates by repeating data that it receives on one port to all the other ports. |
- | | Hypertext Transfer Protocol | + | |Humint|Humint is an abbreviation for Human Intelligence; |
- | | ICMP (Internet Control Message Protocol) | An Internet Standard protocol that is used to report error conditions during IP datagram processing and to exchange other information concerning the state of the IP network.| | + | |Hybrid Attack|A Hybrid Attack builds on the dictionary attack method by adding numerals and symbols to dictionary words.| |
- | | Identity | Identity is whom someone or what something is, for example, the name by which something is known.| | + | |Hybrid Encryption|An application of cryptography that combines two or more encryption algorithms, particularly a combination of symmetric and asymmetric encryption.| |
- | | IETF (Internet Engineering Task Force) | The body that defines standard Internet operating protocols such as TCP/ | + | |Hyperlink|In hypertext or hypermedia, an information object (such as a word, a phrase, or an image; usually highlighted by color or underscoring) that points (indicates how to connect) to related information that is located elsewhere and can be retrieved by activating the link.| |
- | | IMAP (Internet Message Access Protocol) | A protocol that defines how a client should fetch mail from and return mail to a mail server. | + | |Hypertext Markup Language|HTML. |
- | | Incident | An incident as an adverse network event in an information system or network or the threat of the occurrence of such an event.| | + | |Hypertext Transfer Protocol|HTTP. |
- | | Incident Handling | Incident Handling is an action plan for dealing with intrusions, cyber-theft, | + | |ICMP|Internet Control Message Protocol.| |
- | | Incremental Backups | Incremental backups only backup the files that have been modified since the last backup. | + | |:::|An Internet Standard protocol that is used to report error conditions during IP datagram processing and to exchange other information concerning the state of the IP network.| |
- | | Industrial Espionage | Espionage is the use of illegal means (spying) to collect Information, | + | |Identity | Identity is whom someone or what something is, for example, the name by which something is known.| |
- | | INETD | Inetd (or Internet Daemon) is an application that controls smaller internet services like telnet, ftp, and POP.| | + | |IETF|Internet Engineering Task Force.| |
- | | Inference Attack | Inference Attacks rely on the user to make logical connections between seemingly unrelated pieces of information.| | + | |:::|The body that defines standard Internet operating protocols such as TCP/ |
- | | Information Warfare | Information Warfare is the competition between offensive and defensive players over information resources.| | + | |IMAP|Internet Message Access Protocol.| |
- | | Ingress Filtering | Ingress Filtering is filtering inbound traffic.| | + | |:::|A protocol that defines how a client should fetch mail from and return mail to a mail server. |
- | | Input Validations Attack | Input Validations Attacks are where an attacker intentionally sends unusual input in the hopes of confusing an application.| | + | |Incident|An incident as an adverse network event in an information system or network or the threat of the occurrence of such an event.| |
- | | Integrity | Integrity is the need to ensure that information has not been changed accidentally or deliberately, | + | |Incident Handling|Incident Handling is an action plan for dealing with intrusions, cyber-theft, |
- | | Integrity Star Property | In Integrity Star Property a user cannot read data of a lower integrity level then their own.| | + | |Incremental Backups|Incremental backups only backup the files that have been modified since the last backup. |
- | | Intellectual Property | Intellectual Property refers to the definition and recording of a novel device, product, process or technique so that it may be bought, sold or legally protected. | + | |Industrial Espionage|Espionage is the use of illegal means (spying) to collect Information, |
- | | Intelligence | Intelligence is high-level, processed, exploitable Information.| | + | |INETD|Inetd (or Internet Daemon) is an application that controls smaller internet services like telnet, ftp, and POP.| |
- | | International Organization for Standardization (ISO) | A voluntary, non-treaty, non-government organization, | + | |Inference Attack|Inference Attacks rely on the user to make logical connections between seemingly unrelated pieces of information.| |
- | | International Telecommunications Union (ITU-T) | Telecommunication Standardization Sector (formerly " | + | |Information Warfare|Information Warfare is the competition between offensive and defensive players over information resources.| |
- | | Internet | A term to describe connecting multiple separate networks together.| | + | |Ingress Filtering|Ingress Filtering is filtering inbound traffic.| |
- | | Internet Control Message Protocol | + | |Input Validations Attack|Input Validations Attacks are where an attacker intentionally sends unusual input in the hopes of confusing an application.| |
- | | Internet Engineering Task Force (IETF) | The body that defines standard Internet operating protocols such as TCP/ | + | |Integrity | Integrity is the need to ensure that information has not been changed accidentally or deliberately, |
- | | Internet Message Access Protocol | + | |Integrity Star Property|In Integrity Star Property a user cannot read data of a lower integrity level then their own.| |
- | | Internet Protocol | + | |Intellectual Property|Intellectual Property refers to the definition and recording of a novel device, product, process or technique so that it may be bought, sold or legally protected. |
- | | Internet Protocol Security | + | |Intelligence|Intelligence is high-level, processed, exploitable Information.| |
- | | Internet Relay Chat (IRC) | Internet Relay Chat (IRC) is a huge, multi-user live chat facility. | + | |International Organization for Standardization (ISO)|A voluntary, non-treaty, non-government organization, |
- | | Internet Service Provider | + | |International Telecommunications Union|ITU-T.| |
- | | Internet Standard | A specification, | + | |:::|Telecommunication Standardization Sector (formerly " |
- | | Interrupt | An Interrupt is a signal that informs the OS that something has occurred.| | + | |Internet|A term to describe connecting multiple separate networks together.| |
- | | Intranet | A computer network, especially one based on Internet technology, that an organization uses for its own internal, and usually private, purposes and that is closed to outsiders.| | + | |Internet Control Message Protocol|ICMP.| |
- | | Intrusion Detection | A security management system for computers and networks. | + | |:::|An Internet Standard protocol that is used to report error conditions during IP datagram processing and to exchange other information concerning the state of the IP network.| |
- | | Invisible Web | Invisible Web is that portion (estimated to be between 60 and 80 per cent) of total Web content that consists of material that is not accessible by standard Search engines. | + | |Internet Engineering Task Force|IETF.| |
- | | IP (Internet Protocol) | The method or protocol by which data is sent from one computer to another on the Internet.| | + | |:::|The body that defines standard Internet operating protocols such as TCP/ |
- | | IP Address | A computer' | + | |Internet Message Access Protocol|IMAP.| |
- | | IP Flood | A denial of service attack that sends a host more echo request (" | + | |:::|A protocol that defines how a client should fetch mail from and return mail to a mail server. |
- | | IP Forwarding | IP forwarding is an Operating System option that allows a host to act as a router. | + | |Internet Protocol|IP.| |
- | | IPSEC (Internet Protocol Security) | A developing standard for security at the network or packet processing layer of network communication.| | + | |:::|The method or protocol by which data is sent from one computer to another on the Internet.| |
- | | IP Spoofing | The technique of supplying a false IP address.| | + | |Internet Protocol Security|IPSEC.| |
- | | IRC (Internet Relay Chat) | Internet Relay Chat (IRC) is a huge, multi-user live chat facility. | + | |:::|A developing standard for security at the network or packet processing layer of network communication.| |
- | | IRM | Information Risk Management.| | + | |Internet Relay Chat|IRC.| |
- | | ISO (International Organization for Standardization) | A voluntary, non-treaty, non-government organization, | + | |:::|Internet Relay Chat (IRC) is a huge, multi-user live chat facility. |
- | | ISP (Internet Service Provider) | An Internet Service Provider (ISP) is a company selling access to the Internet.| | + | |Internet Service Provider|ISP.| |
- | | Issue-specific Policy | An Issue-Specific Policy is intended to address specific needs within an organization, | + | |:::|An Internet Service Provider (ISP) is a company selling access to the Internet.| |
- | | ITU-T (International Telecommunications Union) | Telecommunication Standardization Sector (formerly " | + | |Internet Standard|A specification, |
- | | Jitter | Jitter or Noise is the modification of fields in a database while preserving the aggregate characteristics of that make the database useful in the first place.| | + | |Interrupt|An Interrupt is a signal that informs the OS that something has occurred.| |
- | | Jump Bag | A Jump Bag is a container that has all the items necessary to respond to an incident inside to help mitigate the effects of delayed reactions.| | + | |Intranet|A computer network, especially one based on Internet technology, that an organization uses for its own internal, and usually private, purposes and that is closed to outsiders.| |
- | | Kerberos | A system developed at the Massachusetts Institute of Technology that depends on passwords and symmetric cryptography (DES) to implement ticket-based, | + | |Intrusion Detection|A security management system for computers and networks. |
- | | Kernel | The essential centre of a computer operating system, the core that provides basic services for all other parts of the operating system. | + | |Invisible Web|Invisible Web is that portion (estimated to be between 60 and 80 per cent) of total Web content that consists of material that is not accessible by standard Search engines. |
- | | KYC | Know Your Customer.| | + | |IP|Internet Protocol).| |
- | | L2F (Layer 2 Forwarding Protocol) | An Internet protocol (originally developed by Cisco Corporation) that uses tunnelling of PPP over IP to create a virtual extension of a dial-up link across a network, initiated by the dial-up server and transparent to the dial-up user.| | + | |:::|The method or protocol by which data is sent from one computer to another on the Internet.| |
- | | L2FP (Layer 2 Tunnelling | + | |IP Address|A computer' |
- | | Lattice Techniques | Lattice Techniques use security designations to determine access to information.| | + | |IP Flood|A denial of service attack that sends a host more echo request (" |
- | | Layer 2 Forwarding Protocol | + | |IP Forwarding|IP forwarding is an Operating System option that allows a host to act as a router. |
- | | Layer 2 Tunnelling | + | |IPSEC|Internet Protocol Security).| |
- | | Least Privilege | Least Privilege is the principle of allowing users or applications the least amount of permissions necessary to perform their intended function.| | + | |:::|A developing standard for security at the network or packet processing layer of network communication.| |
- | | Legion | Software to detect unprotected shares.| | + | |IP Spoofing|The technique of supplying a false IP address.| |
- | | Lightweight Directory Access Protocol | + | |IRC|Internet Relay Chat (IRC) is a huge, multi-user live chat facility. |
- | | Link State | With link state, routes maintain information about all routers and router-to-router links within a geographic area, and creates a table of best routes with that information.| | + | |IRM|Information Risk Management.| |
- | | List-based Access Control | List Based Access Control associates a list of users and their privileges with each object.| | + | |ISO|International Organization for Standardization).| |
- | | LKM (Loadable Kernel Modules) | Loadable Kernel Modules allow for the adding of additional functionality directly into the kernel while the system is running.| | + | |:::|A voluntary, non-treaty, non-government organization, |
- | | Loadable Kernel Modules | + | |ISP|Internet Service Provider).| |
- | | Log Clipping | Log clipping is the selective removal of log entries from a system log to hide a compromise.| | + | |:::|An Internet Service Provider (ISP) is a company selling access to the Internet.| |
- | | Logic Bombs | Logic bombs are programs or snippets of code that execute when a certain predefined event occurs. | + | |Issue-specific Policy | An Issue-Specific Policy is intended to address specific needs within an organization, |
- | | Logic Gate | A logic gate is an elementary building block of a digital circuit. | + | |ITU-T|International Telecommunications Union).| |
- | | Loopback Address | The loopback address (127.0.0.1) is a pseudo IP address that always refer back to the local host and are never sent out onto a network.| | + | |:::|Telecommunication Standardization Sector (formerly " |
- | | LTR | Large Transaction Report.| | + | |Jitter|Jitter or Noise is the modification of fields in a database while preserving the aggregate characteristics of that make the database useful in the first place.| |
- | | MAC (Mandatory Access Control) | Mandatory Access Control controls is where the system controls access to resources based on classification levels assigned to both the objects and the users. | + | |Jump Bag|A Jump Bag is a container that has all the items necessary to respond to an incident inside to help mitigate the effects of delayed reactions.| |
- | | MAC Address | A physical address; a numeric value that uniquely identifies that network device from every other device on the planet.| | + | |Kerberos|A system developed at the Massachusetts Institute of Technology that depends on passwords and symmetric cryptography (DES) to implement ticket-based, |
- | | Malicious Code | Software (e.g., Trojan horse) that appears to perform a useful or desirable function, but actually gains unauthorized access to system resources or tricks a user into executing other malicious logic.| | + | |Kernel|The essential centre of a computer operating system, the core that provides basic services for all other parts of the operating system. |
- | | Malware | A generic term for a number of different types of malicious code.| | + | |KYC|Know Your Customer.| |
- | | Mandatory Access Control | + | |L2F|Layer 2 Forwarding Protocol).| |
- | | Man in the Middle | + | |:::|An Internet protocol (originally developed by Cisco Corporation) that uses tunnelling of PPP over IP to create a virtual extension of a dial-up link across a network, initiated by the dial-up server and transparent to the dial-up user.| |
- | | Masquerade Attack | A type of attack in which one system entity illegitimately poses as (assumes the identity of) another entity.| | + | |L2FP|Layer 2 Tunneling |
- | | MD5 | A one way cryptographic hash function. | + | |:::|An extension of the Point-to-Point |
- | | Measures of Effectiveness | + | |Lattice Techniques|Lattice Techniques use security designations to determine access to information.| |
- | | MFT | Managed File Transfer.| | + | |Layer 2 Forwarding Protocol|L2F. |
- | | MI | Management Information.| | + | |Layer 2 Tunneling |
- | | MITM (Man in the Middle) Attack | + | |Least Privilege|Least Privilege is the principle of allowing users or applications the least amount of permissions necessary to perform their intended function.| |
- | | MOE (Measures of Effectiveness) | Measures of Effectiveness is a probability model based on engineering concepts that allows one to approximate the impact a give action will have on an environment. In Information warfare it is the ability to attack or defend within an Internet environment.| | + | |Legion|Software to detect unprotected shares.| |
- | | Monoculture | Monoculture is the case where a large number of users run the same software, and are vulnerable to the same attacks.| | + | |Lightweight Directory Access Protocol|LDAP. |
- | | Morris Worm | A worm program written by Robert T. Morris, Jr. that flooded the ARPANET in November, 1988, causing problems for thousands of hosts.| | + | |Link State|With link state, routes maintain information about all routers and router-to-router links within a geographic area, and creates a table of best routes with that information.| |
- | | MoSCoW | Must, Should, Could, Would.| | + | |List-based Access Control | List Based Access Control associates a list of users and their privileges with each object.| |
- | | Mule | Also known as a money mule, a mule is an individual who transfers stolen money or merchandise either in person, through a courier service or electronically to help obscure a scammer’s identity and/or location. | + | |LKM|Loadable Kernel Modules.| |
- | | Multi-Cast | Broadcasting from one host to a given set of hosts.| | + | |:::|Loadable Kernel Modules allow for the adding of additional functionality directly into the kernel while the system is running.| |
- | | Multi-Homed | You are " | + | |Loadable Kernel Modules|LKM. |
- | | Multiplexing | To combine multiple signals from possibly disparate sources, in order to transmit them over a single path.| | + | |Log Clipping|Log clipping is the selective removal of log entries from a system log to hide a compromise.| |
- | | NAT (Network Address Translation) | It is used to share one or a small number of publicly routable IP addresses among a larger number of hosts. | + | |Logic Bombs|Logic bombs are programs or snippets of code that execute when a certain predefined event occurs. |
- | | National Institute of Standards and Technology | + | |Logic Gate|A logic gate is an elementary building block of a digital circuit. |
- | | Natural Disaster | Any "act of God" (e.g., fire, flood, earthquake, lightning, or wind) that disables a system component.| | + | |Loopback Address | The loopback address (127.0.0.1) is a pseudo IP address that always refer back to the local host and are never sent out onto a network.| |
- | | Netmask | 32-bit number indicating the range of IP addresses residing on a single IP network/ | + | |LTR|Large Transaction Report.| |
- | | Network Address Translation | + | |MAC|Mandatory Access Control).| |
- | | Network-based IDS | A network-based IDS system monitors the traffic on its network segment as a data source. | + | |:::|Mandatory Access Control controls is where the system controls access to resources based on classification levels assigned to both the objects and the users. |
- | | Network Mapping | To compile an electronic inventory of the systems and the services on your network.| | + | |MAC Address|A physical address; a numeric value that uniquely identifies that network device from every other device on the planet.| |
- | | Network Taps | Network taps are hardware devices that hook directly onto the network cable and send a copy of the traffic that passes through it to one or more other networked devices.| | + | |Malicious Code|Software (e.g., Trojan horse) that appears to perform a useful or desirable function, but actually gains unauthorized access to system resources or tricks a user into executing other malicious logic.| |
- | | Newsgroup | Newsgroup is the name for a discussion group or chat room.| | + | |Malware|A generic term for a number of different types of malicious code.| |
- | | Nginx | Nginx Web Server. | + | |Mandatory Access Control|MAC. |
- | | Node | Node is any single device connected to a Network.| | + | |Man in the Middle Attack|MITM.| |
- | | Non FCT | Non Functional Testing. | + | |:::|In cryptography, |
- | | Non-printable character | A character that doesn' | + | |Masquerade Attack|A type of attack in which one system entity illegitimately poses as (assumes the identity of) another entity.| |
- | | Non-repudiation | Non-repudiation is the ability for a system to prove that a specific user and only that specific user sent a message and that it hasn't been modified.| | + | |MD5|A one way cryptographic hash function. |
- | | Null Session | Known as Anonymous Logon, it is a way of letting an anonymous user retrieve information such as user names and shares over the network or connect without authentication. It is used by applications such as explorer.exe to enumerate shares on remote servers.| | + | |Measures of Effectiveness|MOE.| |
- | | OAT | Operational Acceptance Testing. | + | |:::|Measures of Effectiveness is a probability model based on engineering concepts that allows one to approximate the impact a give action will have on an environment. In Information warfare it is the ability to attack or defend within an Internet environment.| |
- | | Octet | A sequence of eight bits. An octet is an eight-bit byte.| | + | |MFT|Managed File Transfer.| |
- | | One-way Encryption | Irreversible transformation of plain-text to cipher text, such that the plain-text cannot be recovered from the cipher text by other than exhaustive procedures even if the cryptographic key is known.| | + | |MI|Management Information.| |
- | | One-way Function | A (mathematical) function, f, which is easy to compute the output based on a given input. | + | |MITM Attack|Man in the Middle.| |
- | | Open Shortest Path First (OSPF) | + | |:::|In cryptography, |
- | | Open Source Information | Open source information is unclassified published information. | + | |MOE|Measures of Effectiveness).| |
- | | Open Systems Interconnection | + | |:::|Measures of Effectiveness is a probability model based on engineering concepts that allows one to approximate the impact a give action will have on an environment. In Information warfare it is the ability to attack or defend within an Internet environment.| |
- | | OR | Operational Risk.| | + | |Monoculture|Monoculture is the case where a large number of users run the same software, and are vulnerable to the same attacks.| |
- | | ORF | Operational Risk Framework.| | + | |Morris Worm|A worm program written by Robert T. Morris, Jr. that flooded the ARPANET in November, 1988, causing problems for thousands of hosts.| |
- | | ORIA | Operational Risk Impact Assessment. | + | |MoSCoW | Must, Should, Could, Would.| |
- | | OSI (Open Systems Interconnection) | OSI is a standard description or " | + | |Mule|Also known as a money mule, a mule is an individual who transfers stolen money or merchandise either in person, through a courier service or electronically to help obscure a scammer’s identity and/or location. |
- | | OSI Layers | The main idea in OSI is that the process of communication between two end points in a telecommunication network can be divided into layers, with each layer adding its own set of special, related functions. | + | |Multi-Cast|Broadcasting from one host to a given set of hosts.| |
- | | OSPF (Open Shortest Path First) | + | |Multi-Homed|You are " |
- | | Overload | Hindrance of system operation by placing excess burden on the performance capabilities of a system component.| | + | |Multiplexing|To combine multiple signals from possibly disparate sources, in order to transmit them over a single path.| |
- | | Packet | A piece of a message transmitted over a packet-switching network. One of the key features of a packet is that it contains the destination address in addition to the data. In IP networks, packets are often called datagrams.| | + | |NAT|Network Address Translation).| |
- | | Packet Switched Network | A packet switched network is where individual packets each follow their own paths through the network from one endpoint to another.| | + | |:::|It is used to share one or a small number of publicly routable IP addresses among a larger number of hosts. |
- | | PAN | Primary Account Number.| | + | |National Institute of Standards and Technology|NIST. |
- | | Partitions | Major divisions of the total physical hard disk space.| | + | |Natural Disaster|Any "act of God" (e.g., fire, flood, earthquake, lightning, or wind) that disables a system component.| |
- | | Password Authentication Protocol | + | |Netmask|32-bit number indicating the range of IP addresses residing on a single IP network/ |
- | | Password Cracking | Password cracking is the process of attempting to guess passwords, given the password file information.| | + | |Network Address Translation|NAT. |
- | | Password Sniffing | Passive wiretapping, | + | |Network-based IDS|A network-based IDS system monitors the traffic on its network segment as a data source. |
- | | PATS | Per Application Test Strategy.| | + | |Network Mapping|To compile an electronic inventory of the systems and the services on your network.| |
- | | Patch | A patch is a small update released by a software manufacturer to fix bugs in existing programs.| | + | |Network Taps|Network taps are hardware devices that hook directly onto the network cable and send a copy of the traffic that passes through it to one or more other networked devices.| |
- | | Patching | Patching is the process of updating software to a different version.| | + | |Newsgroup|Newsgroup is the name for a discussion group or chat room.| |
- | | Payload | Payload is the actual application data a packet contains.| | + | |Nginx|Nginx Web Server. |
- | | Penetration | Gaining unauthorized logical access to sensitive data by circumventing a system' | + | |Node|Node is any single device connected to a Network.| |
- | | Penetration Testing | Penetration testing is used to test the external perimeter security of a network or facility.| | + | |Non FCT|Non Functional Testing. |
- | | PERL (Practical Extraction and Reporting Language) | A script programming language that is similar in syntax to the C language and that includes a number of popular Unix facilities such as sed, awk, and tr.| | + | |Non-printable character|A character that doesn' |
- | | Permutation | Permutation keeps the same letters but changes the position within a text to scramble the message.| | + | |Non-repudiation|Non-repudiation is the ability for a system to prove that a specific user and only that specific user sent a message and that it hasn't been modified.| |
- | | Personal Firewalls | Personal firewalls are those firewalls that are installed and run on individual PCs.| | + | |Null Session|Known as Anonymous Logon, it is a way of letting an anonymous user retrieve information such as user names and shares over the network or connect without authentication. It is used by applications such as explorer.exe to enumerate shares on remote servers.| |
- | | PFS (Public Key Forward Secrecy) | For a key agreement protocol based on asymmetric cryptography, | + | |OAT|Operational Acceptance Testing. |
- | | Pharming | This is a more sophisticated form of MITM attack. | + | |Octet|A sequence of eight bits. An octet is an eight-bit byte.| |
- | | Phishing | The use of e-mails that appear to originate from a trusted source to trick a user into entering valid credentials at a fake website. | + | |One-way Encryption|Irreversible transformation of plain-text to cipher text, such that the plain-text cannot be recovered from the cipher text by other than exhaustive procedures even if the cryptographic key is known.| |
- | | PII | Personal Identifiable Information.| | + | |One-way Function |A (mathematical) function, f, which is easy to compute the output based on a given input. |
- | | Ping of Death | An attack that sends an improperly large ICMP echo request packet (a " | + | |Open Shortest Path First|(OSPF) Open Shortest Path First is a link state routing algorithm used in interior gateway routing. Routers maintain a database of all routers in the autonomous system with links between the routers, link costs, and link states (up and down).| |
- | | Ping Scan | A ping scan looks for machines that are responding to ICMP Echo Requests.| | + | |Open Source Information |Open source information is unclassified published information. |
- | | Ping Sweep | An attack that sends ICMP echo requests (" | + | |Open Systems Interconnection|OSI is a standard description or " |
- | | PIR | Post Incident Review.| | + | |OR|Operational Risk.| |
- | | PGP (Pretty Good Privacy) | Trademark of Network Associates, Inc., referring to a computer program (and related protocols) that uses cryptography to provide data security for electronic mail and other applications on the Internet.| | + | |ORF|Operational Risk Framework.| |
- | | PKI (Public Key Infrastructure) | + | |ORIA|Operational Risk Impact Assessment. |
- | | Plaintext | Ordinary readable text before being encrypted into ciphertext or after being decrypted.| | + | |OSI|Open Systems Interconnection.| |
- | | PMI | Potential Major Incident.| | + | |:::|OSI is a standard description or " |
- | | PoC (Proof of Concept) | A proof of concept is realisation of a certain method or idea to demonstrate its feasibility, | + | |OSI Layers|The main idea in OSI is that the process of communication between two end points in a telecommunication network can be divided into layers, with each layer adding its own set of special, related functions. |
- | | POC | Point of Contact.| | + | |OSPF| Open Shortest Path First is a link state routing algorithm used in interior gateway routing. Routers maintain a database of all routers in the autonomous system with links between the routers, link costs, and link states (up and down).| |
- | | Point-to-Point | + | |Overload|Hindrance of system operation by placing excess burden on the performance capabilities of a system component.| |
- | | Point-to-Point | + | |Packet|A piece of a message transmitted over a packet-switching network. One of the key features of a packet is that it contains the destination address in addition to the data. In IP networks, packets are often called datagrams.| |
- | | Poison Reverse | Split horizon with poisoned reverse (more simply, poison reverse) does include such routes in updates, but sets their metrics to infinity. In effect, advertising the fact that there routes are not reachable.| | + | |Packet Switched Network|A packet switched network is where individual packets each follow their own paths through the network from one endpoint to another.| |
- | | Polyinstantiation | Polyinstantiation is the ability of a database to maintain multiple records with the same key. It is used to prevent inference attacks.| | + | |PAN|Primary Account Number.| |
- | | Polymorphism | Polymorphism is the process by which malicious software changes its underlying code to avoid detection.| | + | |Partitions|Major divisions of the total physical hard disk space.| |
- | | POP3 (Post Office Protocol Version 3) | An Internet Standard protocol by which a client workstation can dynamically access a mailbox on a server host to retrieve mail messages that the server has received and is holding for the client.| | + | |Password Authentication Protocol|PAP. |
+ | |Password Cracking|Password cracking is the process of attempting to guess passwords, given the password file information.| | ||
+ | |Password Sniffing|Passive wiretapping, | ||
+ | |PATS|Per Application Test Strategy.| | ||
+ | |Patch|A patch is a small update released by a software manufacturer to fix bugs in existing programs.| | ||
+ | |Patching|Patching is the process of updating software to a different version.| | ||
+ | |Payload|Payload is the actual application data a packet contains.| | ||
+ | |Penetration|Gaining unauthorized logical access to sensitive data by circumventing a system' | ||
+ | |Penetration Testing|Penetration testing is used to test the external perimeter security of a network or facility.| | ||
+ | |PERL|Practical Extraction and Reporting Language).| | ||
+ | |:::|A script programming language that is similar in syntax to the C language and that includes a number of popular Unix facilities such as sed, awk, and tr.| | ||
+ | |Permutation|Permutation keeps the same letters but changes the position within a text to scramble the message.| | ||
+ | |Personal Firewalls|Personal firewalls are those firewalls that are installed and run on individual PCs.| | ||
+ | |PFS|Public Key Forward Secrecy.| | ||
+ | |:::|For a key agreement protocol based on asymmetric cryptography, | ||
+ | |Pharming|This is a more sophisticated form of MITM attack. | ||
+ | |Phishing|The use of e-mails that appear to originate from a trusted source to trick a user into entering valid credentials at a fake website. | ||
+ | |PII|Personal Identifiable Information.| | ||
+ | |Ping of Death|An attack that sends an improperly large ICMP echo request packet (a " | ||
+ | |Ping Scan|A ping scan looks for machines that are responding to ICMP Echo Requests.| | ||
+ | |Ping Sweep|An attack that sends ICMP echo requests (" | ||
+ | |PIR|Post Incident Review.| | ||
+ | |PGP|Pretty Good Privacy).| | ||
+ | |:::|Trademark of Network Associates, Inc., referring to a computer program (and related protocols) that uses cryptography to provide data security for electronic mail and other applications on the Internet.| | ||
+ | |PKI|A PKI (public key infrastructure) enables users of a basically unsecured public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. | ||
+ | |Plaintext|Ordinary readable text before being encrypted into ciphertext or after being decrypted.| | ||
+ | |PMI|Potential Major Incident.| | ||
+ | |PoC|Proof of Concept).| | ||
+ | |:::|A proof of concept is realisation of a certain method or idea to demonstrate its feasibility, | ||
+ | |POC|Point of Contact.| | ||
+ | |Point-to-Point|PPP.| | ||
+ | |:::|A protocol for communication between two computers using a serial interface, typically a personal computer connected by phone line to a server. | ||
+ | |Point-to-Point | ||
+ | |Poison Reverse|Split horizon with poisoned reverse (more simply, poison reverse) does include such routes in updates, but sets their metrics to infinity. In effect, advertising the fact that there routes are not reachable.| | ||
+ | |Polyinstantiation|Polyinstantiation is the ability of a database to maintain multiple records with the same key. It is used to prevent inference attacks.| | ||
+ | |Polymorphism|Polymorphism is the process by which malicious software changes its underlying code to avoid detection.| | ||
+ | |POP3|Post Office Protocol Version 3).| | ||
+ | |:::|An Internet Standard protocol by which a client workstation can dynamically access a mailbox on a server host to retrieve mail messages that the server has received and is holding for the client.| | ||
|Port|A port is nothing more than an integer that uniquely identifies an endpoint of a communication stream. | |Port|A port is nothing more than an integer that uniquely identifies an endpoint of a communication stream. | ||
|Port Scan|A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services, each associated with a " | |Port Scan|A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services, each associated with a " | ||
Line 580: | Line 643: | ||
|RPC Scans|RPC scans determine which RPC services are running on a machine.| | |RPC Scans|RPC scans determine which RPC services are running on a machine.| | ||
|RSS|Really Simple Syndication.| | |RSS|Really Simple Syndication.| | ||
- | |:::|RSS is a family of web feed formats used to publish frequently updated works such as blog entries, news headlines, audio, and video in a standardised format. | + | |:::|RSS is a family of web feed formats used to publish frequently updated works such as blog entries, news headlines, audio, and video in a standardised format. |
|RTM|Requirements Traceability Matrix. | |RTM|Requirements Traceability Matrix. | ||
- | |RTQ|Risk | + | |RTQ|Risk |
|Rule Set Based Access Control|RSBAC.| | |Rule Set Based Access Control|RSBAC.| | ||
|:::|Rule Set Based Access Control targets actions based on rules for entities operating on objects.| | |:::|Rule Set Based Access Control targets actions based on rules for entities operating on objects.| | ||
Line 729: | Line 792: | ||
|UAT|User Acceptance Testing.| | |UAT|User Acceptance Testing.| | ||
|UDF|User Defined Field.| | |UDF|User Defined Field.| | ||
- | |UDP|User Datagram Protocol)| | + | |UDP|User Datagram Protocol| |
|:::|A communications protocol that, like TCP, runs on top of IP networks. | |:::|A communications protocol that, like TCP, runs on top of IP networks. | ||
|UDP Scan|UDP scans perform scans to determine which UDP ports are open.| | |UDP Scan|UDP scans perform scans to determine which UDP ports are open.| | ||
Line 776: | Line 839: | ||
|Windowing|A windowing system is a system for sharing a computer' | |Windowing|A windowing system is a system for sharing a computer' | ||
|Windump|Windump is a freeware tool for Windows that is a protocol analyzer that can monitor network traffic on a wire.| | |Windump|Windump is a freeware tool for Windows that is a protocol analyzer that can monitor network traffic on a wire.| | ||
- | |Wired Equivalent Privacy|WEP. | + | |Wired Equivalent Privacy|WEP.| |
+ | |:::|A security protocol for wireless local area networks defined in the standard IEEE 802.11b.| | ||
|Wireless Application Protocol|A specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, | |Wireless Application Protocol|A specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, | ||
|Wiretapping|Monitoring and recording data that is flowing between two points in a communication system.| | |Wiretapping|Monitoring and recording data that is flowing between two points in a communication system.| | ||
- | |World Wide Web Consortium|W3C. The W3C is an international organization that develops Web standards.| | + | |World Wide Web Consortium|W3C.| |
- | |World Wide Web|WWW. | + | |:::|The W3C is an international organization that develops Web standards.| |
+ | |World Wide Web|WWW.| | ||
+ | |:::|Also known as "THE WEB" or W3.| | ||
|Worm|A computer program that can run independently, | |Worm|A computer program that can run independently, | ||
|WWW|World Wide Web.| | |WWW|World Wide Web.| |
glossary/start.1689607167.txt.gz · Last modified: 2023/07/17 15:19 by peter