glossary:start
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
glossary:start [2023/07/17 15:46] – peter | glossary:start [2023/07/17 15:57] (current) – peter | ||
---|---|---|---|
Line 19: | Line 19: | ||
|ACL|Access Control List. A list of permissions attached to an object.| | |ACL|Access Control List. A list of permissions attached to an object.| | ||
|Access Control|Access Control ensures that resources are only granted to those users who are entitled to them.| | |Access Control|Access Control ensures that resources are only granted to those users who are entitled to them.| | ||
- | |Access Control List|(ACL). A list of permissions attached to an object.| | + | |Access Control List|ACL.| |
+ | |:::|A list of permissions attached to an object.| | ||
|Access Control Service|A security service that provides protection of system resources against unauthorized access. | |Access Control Service|A security service that provides protection of system resources against unauthorized access. | ||
|Access Matrix|An Access Matrix uses rows to represent subjects and columns to represent objects with privileges listed in each cell.| | |Access Matrix|An Access Matrix uses rows to represent subjects and columns to represent objects with privileges listed in each cell.| | ||
|Account Harvesting|The process of collecting all the legitimate account names on a system.| | |Account Harvesting|The process of collecting all the legitimate account names on a system.| | ||
|Active Content|Program code embedded in the contents of a web page. When the page is accessed by a web browser, the embedded code is automatically downloaded and executed on the user's workstation. Ex. Java, ActiveX (MS).| | |Active Content|Program code embedded in the contents of a web page. When the page is accessed by a web browser, the embedded code is automatically downloaded and executed on the user's workstation. Ex. Java, ActiveX (MS).| | ||
- | |Active Directory|(AD). A directory service implemented by Microsoft for Windows domain networks. | | + | |Active Directory|AD.| |
+ | |:::|A directory service implemented by Microsoft for Windows domain networks. | | ||
|Activity Monitors|Aim to prevent virus infection by monitoring for malicious activity on a system, and blocking that activity when possible.| | |Activity Monitors|Aim to prevent virus infection by monitoring for malicious activity on a system, and blocking that activity when possible.| | ||
|AD|Active Directory. | |AD|Active Directory. | ||
|ADAL| Authoritive Data Access Layer.| | |ADAL| Authoritive Data Access Layer.| | ||
- | |Address Resolution Protocol|(ARP). A protocol for mapping an Internet Protocol address to a physical machine address that is recognized in the local network. | + | |Address Resolution Protocol|ARP.| |
- | |ADS| Authoritive Data Source.| | + | |:::|A protocol for mapping an Internet Protocol address to a physical machine address that is recognized in the local network. |
+ | |ADS|Authoritive Data Source.| | ||
|ADSL|Asymmetric Digital Subscriber Line (ADSL) is a technology for transmitting digital information at high bandwidth on existing phone lines to homes and businesses. | |ADSL|Asymmetric Digital Subscriber Line (ADSL) is a technology for transmitting digital information at high bandwidth on existing phone lines to homes and businesses. | ||
- | |Advanced Encryption Standard|(AES). An encryption standard being developed by NIST. Intended to specify an unclassified, | + | |Advanced Encryption Standard|AES.| |
- | |AEOD | After End-of-Day.| | + | |:::|An encryption standard being developed by NIST. Intended to specify an unclassified, |
+ | |AEOD|After End-of-Day.| | ||
|AES|Advanced Encryption Standard. | |AES|Advanced Encryption Standard. | ||
- | |AIRB| Advanced Internal Rating Based Approach.| | + | |AIRB|Advanced Internal Rating Based Approach.| |
- | |A&L| Assets and Liabilities | | + | |A& |
- | |Algorithm| A finite set of step-by-step instructions for a problem-solving or computation procedure, especially one that can be implemented by a computer.| | + | |Algorithm|A finite set of step-by-step instructions for a problem-solving or computation procedure, especially one that can be implemented by a computer.| |
|AML|Anti money laundering (AML) is a term mainly used in the financial and legal industries to describe the legal controls that require financial institutions and other regulated entities to prevent or report money laundering activities.| | |AML|Anti money laundering (AML) is a term mainly used in the financial and legal industries to describe the legal controls that require financial institutions and other regulated entities to prevent or report money laundering activities.| | ||
|AMSC|Application Management Service Centre.| | |AMSC|Application Management Service Centre.| | ||
Line 49: | Line 53: | ||
|:::|A globally unique number assigned by a registrar for the purposes of Internet routing, | | |:::|A globally unique number assigned by a registrar for the purposes of Internet routing, | | ||
|Asymmetric Cryptography|Public-key cryptography. | |Asymmetric Cryptography|Public-key cryptography. | ||
- | |Asymmetric Warfare | Asymmetric warfare is the application of dissimilar strategies, tactics, capabilities and approaches used to circumvent or negate an opponent' | + | |Asymmetric Warfare|Asymmetric warfare is the application of dissimilar strategies, tactics, capabilities and approaches used to circumvent or negate an opponent' |
|Auditing|The information gathering and analysis of assets to ensure such things as policy compliance and security from vulnerabilities.| | |Auditing|The information gathering and analysis of assets to ensure such things as policy compliance and security from vulnerabilities.| | ||
|Asymmetric Digital Subscriber Line|ADSL.| | |Asymmetric Digital Subscriber Line|ADSL.| | ||
Line 61: | Line 65: | ||
|Authorization|The approval, permission, or empowerment for someone or something to do something.| | |Authorization|The approval, permission, or empowerment for someone or something to do something.| | ||
|Autonomous System|One network or series of networks that are all under one administrative control. | |Autonomous System|One network or series of networks that are all under one administrative control. | ||
- | |Autonomous System Number|ASN. | + | |Autonomous System Number|ASN.| |
+ | |:::|A globally unique number assigned by a registrar for the purposes of Internet routing.| | ||
|Availability|The need to ensure that the business purpose of the system can be met and that it is accessible to those who need to use it.| | |Availability|The need to ensure that the business purpose of the system can be met and that it is accessible to those who need to use it.| | ||
|Backdoor|A backdoor is a tool installed after a compromise to give an attacker easier access to the compromised system around any security mechanisms that are in place.| | |Backdoor|A backdoor is a tool installed after a compromise to give an attacker easier access to the compromised system around any security mechanisms that are in place.| | ||
Line 67: | Line 72: | ||
|Banner|A banner is the information that is displayed to a remote user trying to connect to a service. | |Banner|A banner is the information that is displayed to a remote user trying to connect to a service. | ||
|BAP|Business and Personal.| | |BAP|Business and Personal.| | ||
- | |Basic Authentication | Basic Authentication is the simplest web-based authentication scheme that works by sending the username and password with each request.| | + | |Basic Authentication|Basic Authentication is the simplest web-based authentication scheme that works by sending the username and password with each request.| |
|Bastion Host|A bastion host has been hardened in anticipation of vulnerabilities that have not been discovered yet.| | |Bastion Host|A bastion host has been hardened in anticipation of vulnerabilities that have not been discovered yet.| | ||
|BAU|Business as Usual.| | |BAU|Business as Usual.| | ||
- | |BBS|A Bulletin Board System (BBS) is a computerized meeting and announcement system that allows people to carry on discussions, | + | |BBS|Bulletin Board System.| |
+ | |:::|A Bulletin Board System (BBS) is a computerized meeting and announcement system that allows people to carry on discussions, | ||
|BCM|Business Continuity Management. The management of a Business Continuity Plan (BCP).| | |BCM|Business Continuity Management. The management of a Business Continuity Plan (BCP).| | ||
|BCP|Business Continuity Plan. A Business Continuity Plan is the plan for emergency response, backup operations, and post-disaster recovery steps that will ensure the availability of critical resources and facilitate the continuity of operations in an emergency situation.| | |BCP|Business Continuity Plan. A Business Continuity Plan is the plan for emergency response, backup operations, and post-disaster recovery steps that will ensure the availability of critical resources and facilitate the continuity of operations in an emergency situation.| | ||
Line 88: | Line 94: | ||
|BLoR|Business List of Records. | |BLoR|Business List of Records. | ||
|BOM|Business Only Membership.| | |BOM|Business Only Membership.| | ||
- | |Border Gateway Protocol|BGP. | + | |Border Gateway Protocol|BGP.| |
+ | |:::|An inter-autonomous system routing protocol. | ||
|Boot Record Infector|A boot record infector is a piece of malware that inserts malicious code into the boot sector of a disk.| | |Boot Record Infector|A boot record infector is a piece of malware that inserts malicious code into the boot sector of a disk.| | ||
|Bot|Also called ‘Internet bots’; refers to computers that perform tasks without human input. | |Bot|Also called ‘Internet bots’; refers to computers that perform tasks without human input. | ||
Line 102: | Line 109: | ||
|Brute Force|A crypto-analysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, | |Brute Force|A crypto-analysis technique or other kind of attack method involving an exhaustive procedure that tries all possibilities, | ||
|BSM|Balance Sheet Management.| | |BSM|Balance Sheet Management.| | ||
- | |BSS 7799|British Standard 7799. A standard code of practice and provides guidance on how to secure an information system. | + | |BSS 7799|British Standard 7799.| |
+ | |:::|A standard code of practice and provides guidance on how to secure an information system. | ||
|BST|British Summer Time.| | |BST|British Summer Time.| | ||
|Buffer Overflow|A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting or overwriting the valid data held in them.| | |Buffer Overflow|A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold. Since buffers are created to contain a finite amount of data, the extra information - which has to go somewhere - can overflow into adjacent buffers, corrupting or overwriting the valid data held in them.| | ||
|Bullet-proof hosting|Bullet-proof hosting is a service provided by some domain hosting or web hosting firms that allow their customer considerable leniency in the kinds of material they may upload and distribute. | |Bullet-proof hosting|Bullet-proof hosting is a service provided by some domain hosting or web hosting firms that allow their customer considerable leniency in the kinds of material they may upload and distribute. | ||
- | |Bulletin Board System|A Bulletin Board System (BBS) is a computerized meeting and announcement system that allows people to carry on discussions, | + | |Bulletin Board System|BBS| |
- | |Business Continuity Management|BCM. The management of a Business Continuity Plan (BCP).| | + | |:::|A Bulletin Board System (BBS) is a computerized meeting and announcement system that allows people to carry on discussions, |
- | |Business Continuity Plan|BCP. | + | |Business Continuity Management|BCM.| |
- | |Business Impact Analysis|BIA. | + | |:::|The management of a Business Continuity Plan (BCP).| |
+ | |Business Continuity Plan|BCP.| | ||
+ | |:::|A Business Continuity Plan is the plan for emergency response, backup operations, and post-disaster recovery steps that will ensure the availability of critical resources and facilitate the continuity of operations in an emergency situation.| | ||
+ | |Business Impact Analysis|BIA.| | ||
+ | |:::|A Business Impact Analysis determines what levels of impact to a system are tolerable.| | ||
|Business Intelligence|Business intelligence is now widely accepted as being concerned with information technology solutions for transforming the output from large data collections into Intelligence; | |Business Intelligence|Business intelligence is now widely accepted as being concerned with information technology solutions for transforming the output from large data collections into Intelligence; | ||
|BYOD|Bring Your Own Device.| | |BYOD|Bring Your Own Device.| | ||
Line 115: | Line 127: | ||
|CA|Certificate Authority.| | |CA|Certificate Authority.| | ||
|CAB|Change Advisory Board.| | |CAB|Change Advisory Board.| | ||
- | |CAC|Call Admission Control. | + | |CAC|Call Admission Control.| |
+ | |:::|The inspection and control all inbound and outbound voice network activity by a voice firewall based on user-defined policies.| | ||
|Cache|Pronounced cash, a special high-speed storage mechanism. | |Cache|Pronounced cash, a special high-speed storage mechanism. | ||
|Cache Cramming|Cache Cramming is the technique of tricking a browser to run cached Java code from the local disk, instead of the internet zone, so it runs with less restrictive permissions.| | |Cache Cramming|Cache Cramming is the technique of tricking a browser to run cached Java code from the local disk, instead of the internet zone, so it runs with less restrictive permissions.| | ||
|Cache Poisoning|Malicious or misleading data from a remote name server is saved [cached] by another name server. | |Cache Poisoning|Malicious or misleading data from a remote name server is saved [cached] by another name server. | ||
- | |Call Admission Control|CAC. | + | |Call Admission Control|CAC.| |
+ | |:::|The inspection and control all inbound and outbound voice network activity by a voice firewall based on user-defined policies.| | ||
|CAMS|Cash Management System.| | |CAMS|Cash Management System.| | ||
|Carding|Carding is a term used for a process to verify the validity of stolen card data. The thief presents the card information on a website that has real-time transaction processing. | |Carding|Carding is a term used for a process to verify the validity of stolen card data. The thief presents the card information on a website that has real-time transaction processing. | ||
|Cash-out|The aspect of a cybercrime operation where stolen electronic funds are finally withdrawn from the finance system in the form of hard cash, often perpetrated by the use of ‘money mules’.| | |Cash-out|The aspect of a cybercrime operation where stolen electronic funds are finally withdrawn from the finance system in the form of hard cash, often perpetrated by the use of ‘money mules’.| | ||
- | |CCO|Chief Controls Office. | + | |CCO|Chief Controls Office.| |
+ | |:::|The Chief Controls Office centralizes and increases the focus on maintaining and enhancing an effective control framework.| | ||
|CDC|Client Data Controls.| | |CDC|Client Data Controls.| | ||
|CDI|Client Data Interface.| | |CDI|Client Data Interface.| | ||
Line 175: | Line 190: | ||
|CRAID|Changes, | |CRAID|Changes, | ||
|Crawler|A crawler uses existing Internet search engines to carry out automatic search and retrieval of selected Information on behalf of a user. It may also be known as Web crawler.| | |Crawler|A crawler uses existing Internet search engines to carry out automatic search and retrieval of selected Information on behalf of a user. It may also be known as Web crawler.| | ||
- | |CRC|Cyclic Redundancy Check. | + | |CRC|Cyclic Redundancy Check.| |
+ | |:::|Sometimes called " | ||
|Criminal Forum|A forum, usually web based, devoted to the black market trading of stolen credit card details, stolen identity details and tools to commit computer offences.| | |Criminal Forum|A forum, usually web based, devoted to the black market trading of stolen credit card details, stolen identity details and tools to commit computer offences.| | ||
|CRON|Cron is a Unix application that runs jobs for users and administrators at scheduled times of the day.| | |CRON|Cron is a Unix application that runs jobs for users and administrators at scheduled times of the day.| | ||
Line 200: | Line 216: | ||
|DBC|Detailed Business Case.| | |DBC|Detailed Business Case.| | ||
|DCF|Data Control Framework.| | |DCF|Data Control Framework.| | ||
- | |DCO|Device Configuration Overlay. | + | |DCO|Device Configuration Overlay.| |
+ | |:::|A hidden part of a hard drive that is used by personal computer manufacturers to specify the configuration of a hard drive (regardless of its actual size) to present the same number of sectors to the BIOS and operating system.| | ||
|DCP|Demand Change Process.| | |DCP|Demand Change Process.| | ||
- | |DDOS|Distributed Denial of Service (DDOS) is an attack in which multiple systems flood the bandwidth or resources of a targeted system in an attempt to make it unavailable. | + | |DDOS|Distributed Denial of Service.| |
+ | |:::|Distributed Denial of Service (DDOS) is an attack in which multiple systems flood the bandwidth or resources of a targeted system in an attempt to make it unavailable. | ||
|Decapsulation | Decapsulation is the process of stripping off one layer' | |Decapsulation | Decapsulation is the process of stripping off one layer' | ||
|Decryption|Decryption is the process of transforming an encrypted message into its original plain-text.| | |Decryption|Decryption is the process of transforming an encrypted message into its original plain-text.| | ||
Line 208: | Line 226: | ||
|Defacement|Defacement is the method of modifying the content of a website in such a way that it becomes " | |Defacement|Defacement is the method of modifying the content of a website in such a way that it becomes " | ||
|Defense In-Depth|Defense In-Depth is the approach of using multiple layers of security to guard against failure of a single security component.| | |Defense In-Depth|Defense In-Depth is the approach of using multiple layers of security to guard against failure of a single security component.| | ||
- | |Demilitarized Zone|DMZ. | + | |Demilitarized Zone|DMZ.| |
+ | |:::|In computer security, in general a demilitarized zone (DMZ) or perimeter network is a network area (a sub-network) that sits between an organization' | ||
|Denial of Service|The prevention of authorized access to a system resource or the delaying of system operations and functions.| | |Denial of Service|The prevention of authorized access to a system resource or the delaying of system operations and functions.| | ||
|DES|Data Encryption Standard).| | |DES|Data Encryption Standard).| | ||
Line 217: | Line 236: | ||
|Digest Authentication|Digest Authentication allows a web client to compute MD5 hashes of the password to prove it has the password.| | |Digest Authentication|Digest Authentication allows a web client to compute MD5 hashes of the password to prove it has the password.| | ||
|Digital Certificate|A digital certificate is an electronic " | |Digital Certificate|A digital certificate is an electronic " | ||
- | |Digital Envelope| A digital envelope is an encrypted message with the encrypted session key.| | + | |Digital Envelope|A digital envelope is an encrypted message with the encrypted session key.| |
- | |Digital Signature| A digital signature is a hash of a message that uniquely identifies the sender of the message and proves the message hasn't changed since transmission. | | + | |Digital Signature|A digital signature is a hash of a message that uniquely identifies the sender of the message and proves the message hasn't changed since transmission. | |
- | |Digital Signature Algorithm|DSA. | + | |Digital Signature Algorithm|DSA.| |
- | |Digital Signature Standard|DSS. | + | |:::|An asymmetric cryptographic algorithm that produces a digital signature in the form of a pair of large numbers. |
+ | |Digital Signature Standard|DSS.| | ||
+ | |:::|The US Government standard that specifies the Digital Signature Algorithm (DSA), which involves asymmetric cryptography.| | ||
|Disassembly|The process of taking a binary program and deriving the source code from it.| | |Disassembly|The process of taking a binary program and deriving the source code from it.| | ||
- | |Disaster Recovery Plan|DRP. | + | |Disaster Recovery Plan|DRP.| |
- | |Discretionary Access Control|DAC. | + | |:::|A Disaster Recovery Plan is the process of recovery of IT systems in the event of a disruption or disaster.| |
+ | |Discretionary Access Control|DAC.| | ||
+ | |:::|Discretionary Access Control consists of something the user can manage, such as a document password.| | ||
|Dispensation|Temporary exclusion from Policy or Scope.| | |Dispensation|Temporary exclusion from Policy or Scope.| | ||
|Disruption|A circumstance or event that interrupts or prevents the correct operation of system services and functions.| | |Disruption|A circumstance or event that interrupts or prevents the correct operation of system services and functions.| | ||
|Distance Vector|Distance vectors measure the cost of routes to determine the best route to all known networks.| | |Distance Vector|Distance vectors measure the cost of routes to determine the best route to all known networks.| | ||
- | |Distributed Denial of Service|DDOS. Distributed Denial of Service (DDOS) is an attack in which multiple systems flood the bandwidth or resources of a targeted system in an attempt to make it unavailable. | + | |Distributed Denial of Service|DDOS.| |
+ | |:::|Distributed Denial of Service (DDOS) is an attack in which multiple systems flood the bandwidth or resources of a targeted system in an attempt to make it unavailable. | ||
|Distributed Scans|Distributed Scans are scans that use multiple source addresses to gather information.| | |Distributed Scans|Distributed Scans are scans that use multiple source addresses to gather information.| | ||
|DLL|Dynamic Link Library.| | |DLL|Dynamic Link Library.| | ||
Line 241: | Line 265: | ||
|Domain Hijacking|Domain hijacking is an attack by which an attacker takes over a domain by first blocking access to the domain' | |Domain Hijacking|Domain hijacking is an attack by which an attacker takes over a domain by first blocking access to the domain' | ||
|Domain Name|A domain name locates an organization or other entity on the Internet. | |Domain Name|A domain name locates an organization or other entity on the Internet. | ||
- | |Domain Name System|DNS. | + | |Domain Name System|DNS.| |
+ | |:::|The domain name system (DNS) is the way that Internet domain names are located and translated into Internet Protocol addresses. A domain name is a meaningful and easy-to-remember " | ||
|Download|To download is to retrieve Information from the Internet.| | |Download|To download is to retrieve Information from the Internet.| | ||
|DP|Discussion Paper.| | |DP|Discussion Paper.| | ||
Line 259: | Line 284: | ||
|DWB|Dispensation, | |DWB|Dispensation, | ||
|DX|Developer Experience.| | |DX|Developer Experience.| | ||
- | |Dynamic Link Library|DLL. | + | |Dynamic Link Library|DLL.| |
+ | |:::|A collection of small programs, any of which can be called when needed by a larger program that is running in the computer. | ||
|Dynamic Routing Protocol|Allows network devices to learn routes. Ex. RIP, EIGRP Dynamic routing occurs when routers talk to adjacent routers, informing each other of what networks each router is currently connected to. The routers must communicate using a routing protocol, of which there are many to choose from. The process on the router that is running the routing protocol, communicating with its neighbour routers, is usually called a routing daemon. | |Dynamic Routing Protocol|Allows network devices to learn routes. Ex. RIP, EIGRP Dynamic routing occurs when routers talk to adjacent routers, informing each other of what networks each router is currently connected to. The routers must communicate using a routing protocol, of which there are many to choose from. The process on the router that is running the routing protocol, communicating with its neighbour routers, is usually called a routing daemon. | ||
|E2E|End-to-End. | |E2E|End-to-End. | ||
Line 294: | Line 320: | ||
|Exposure|A threat action whereby sensitive data is directly released to an unauthorized entity.| | |Exposure|A threat action whereby sensitive data is directly released to an unauthorized entity.| | ||
|Extended ACLS|Cisco. | |Extended ACLS|Cisco. | ||
- | |Extensible Authentication Protocol|EAP. | + | |Extensible Authentication Protocol|EAP.| |
- | |Exterior Gateway Protocol|EGP. | + | |:::|A framework that supports multiple, optional authentication mechanisms for PPP, including clear-text passwords, challenge-response, |
+ | |Exterior Gateway Protocol|EGP.| | ||
+ | |:::|A protocol which distributes routing information to the routers which connect autonomous systems.| | ||
|Extranet|Extranet is that portion of an organization’s Intranet that is accessible by selected individuals (for example, collaborators, | |Extranet|Extranet is that portion of an organization’s Intranet that is accessible by selected individuals (for example, collaborators, | ||
|False Rejects|False Rejects are when an authentication system fails to recognize a valid user.| | |False Rejects|False Rejects are when an authentication system fails to recognize a valid user.| | ||
|Fast File System|The first major revision to the Unix file system, providing faster read access and faster (delayed, asynchronous) write access through a disk cache and better file system layout on disk. It uses inodes (pointers) and data blocks.| | |Fast File System|The first major revision to the Unix file system, providing faster read access and faster (delayed, asynchronous) write access through a disk cache and better file system layout on disk. It uses inodes (pointers) and data blocks.| | ||
|Fast Flux|Protection method used by botnets consisting of a continuous and fast change of the DNS records for a domain name through different IP addresses.| | |Fast Flux|Protection method used by botnets consisting of a continuous and fast change of the DNS records for a domain name through different IP addresses.| | ||
- | |FAT|Functional Acceptance Testing. | + | |FAT|Functional Acceptance Testing.| |
- | |Fault Line Attacks | Fault Line Attacks use weaknesses between interfaces of systems to exploit gaps in coverage.| | + | |:::|See FCT.| |
- | |FCT|Functional Confidence Testing. | + | |Fault Line Attacks|Fault Line Attacks use weaknesses between interfaces of systems to exploit gaps in coverage.| |
+ | |FCT|Functional Confidence Testing.| | ||
+ | |:::|Functional testing covers Unit Testing, Smoke Testing, Sanity Testing, Intergration Testing (Top Down, Bottom Up), Interface and Useability Testing, System Testing, Regression Testing, Per User Acceptance Testing (Alpha and Beta), User Acceptance Testing, White Box and Black Box Testing, Globalization and Location Testing.| | ||
|File Transfer Protocol|FTP. | |File Transfer Protocol|FTP. | ||
|Filter A filter is used to specify which packets will or will not be used. It can be used in sniffers to determine which packets get displayed, or by firewalls to determine which packets get blocked.| | |Filter A filter is used to specify which packets will or will not be used. It can be used in sniffers to determine which packets get displayed, or by firewalls to determine which packets get blocked.| | ||
Line 382: | Line 412: | ||
|Intelligence|Intelligence is high-level, processed, exploitable Information.| | |Intelligence|Intelligence is high-level, processed, exploitable Information.| | ||
|International Organization for Standardization (ISO)|A voluntary, non-treaty, non-government organization, | |International Organization for Standardization (ISO)|A voluntary, non-treaty, non-government organization, | ||
- | |International Telecommunications Union|ITU-T. | + | |International Telecommunications Union|ITU-T.| |
+ | |:::|Telecommunication Standardization Sector (formerly " | ||
|Internet|A term to describe connecting multiple separate networks together.| | |Internet|A term to describe connecting multiple separate networks together.| | ||
- | |Internet Control Message Protocol|ICMP. | + | |Internet Control Message Protocol|ICMP.| |
- | |Internet Engineering Task Force|IETF. | + | |:::|An Internet Standard protocol that is used to report error conditions during IP datagram processing and to exchange other information concerning the state of the IP network.| |
- | |Internet Message Access Protocol|IMAP. | + | |Internet Engineering Task Force|IETF.| |
- | |Internet Protocol|IP. | + | |:::|The body that defines standard Internet operating protocols such as TCP/ |
- | |Internet Protocol Security|IPSEC. | + | |Internet Message Access Protocol|IMAP.| |
- | |Internet Relay Chat|IRC. | + | |:::|A protocol that defines how a client should fetch mail from and return mail to a mail server. |
- | |Internet Service Provider|ISP. | + | |Internet Protocol|IP.| |
+ | |:::|The method or protocol by which data is sent from one computer to another on the Internet.| | ||
+ | |Internet Protocol Security|IPSEC.| | ||
+ | |:::|A developing standard for security at the network or packet processing layer of network communication.| | ||
+ | |Internet Relay Chat|IRC.| | ||
+ | |:::|Internet Relay Chat (IRC) is a huge, multi-user live chat facility. | ||
+ | |Internet Service Provider|ISP.| | ||
+ | |:::|An Internet Service Provider (ISP) is a company selling access to the Internet.| | ||
|Internet Standard|A specification, | |Internet Standard|A specification, | ||
|Interrupt|An Interrupt is a signal that informs the OS that something has occurred.| | |Interrupt|An Interrupt is a signal that informs the OS that something has occurred.| | ||
Line 444: | Line 482: | ||
|Malware|A generic term for a number of different types of malicious code.| | |Malware|A generic term for a number of different types of malicious code.| | ||
|Mandatory Access Control|MAC. | |Mandatory Access Control|MAC. | ||
- | |Man in the Middle Attack|MITM. | + | |Man in the Middle Attack|MITM.| |
+ | |:::|In cryptography, | ||
|Masquerade Attack|A type of attack in which one system entity illegitimately poses as (assumes the identity of) another entity.| | |Masquerade Attack|A type of attack in which one system entity illegitimately poses as (assumes the identity of) another entity.| | ||
|MD5|A one way cryptographic hash function. | |MD5|A one way cryptographic hash function. | ||
- | |Measures of Effectiveness|MOE. | + | |Measures of Effectiveness|MOE.| |
+ | |:::|Measures of Effectiveness is a probability model based on engineering concepts that allows one to approximate the impact a give action will have on an environment. In Information warfare it is the ability to attack or defend within an Internet environment.| | ||
|MFT|Managed File Transfer.| | |MFT|Managed File Transfer.| | ||
|MI|Management Information.| | |MI|Management Information.| | ||
Line 526: | Line 566: | ||
|:::|A proof of concept is realisation of a certain method or idea to demonstrate its feasibility, | |:::|A proof of concept is realisation of a certain method or idea to demonstrate its feasibility, | ||
|POC|Point of Contact.| | |POC|Point of Contact.| | ||
- | |Point-to-Point|PPP. | + | |Point-to-Point|PPP.| |
+ | |:::|A protocol for communication between two computers using a serial interface, typically a personal computer connected by phone line to a server. | ||
|Point-to-Point Tunneling Protocol|PPTP. | |Point-to-Point Tunneling Protocol|PPTP. | ||
|Poison Reverse|Split horizon with poisoned reverse (more simply, poison reverse) does include such routes in updates, but sets their metrics to infinity. In effect, advertising the fact that there routes are not reachable.| | |Poison Reverse|Split horizon with poisoned reverse (more simply, poison reverse) does include such routes in updates, but sets their metrics to infinity. In effect, advertising the fact that there routes are not reachable.| | ||
- | |Polyinstantiation | Polyinstantiation is the ability of a database to maintain multiple records with the same key. It is used to prevent inference attacks.| | + | |Polyinstantiation|Polyinstantiation is the ability of a database to maintain multiple records with the same key. It is used to prevent inference attacks.| |
- | |Polymorphism | Polymorphism is the process by which malicious software changes its underlying code to avoid detection.| | + | |Polymorphism|Polymorphism is the process by which malicious software changes its underlying code to avoid detection.| |
|POP3|Post Office Protocol Version 3).| | |POP3|Post Office Protocol Version 3).| | ||
|:::|An Internet Standard protocol by which a client workstation can dynamically access a mailbox on a server host to retrieve mail messages that the server has received and is holding for the client.| | |:::|An Internet Standard protocol by which a client workstation can dynamically access a mailbox on a server host to retrieve mail messages that the server has received and is holding for the client.| | ||
Line 602: | Line 643: | ||
|RPC Scans|RPC scans determine which RPC services are running on a machine.| | |RPC Scans|RPC scans determine which RPC services are running on a machine.| | ||
|RSS|Really Simple Syndication.| | |RSS|Really Simple Syndication.| | ||
- | |:::|RSS is a family of web feed formats used to publish frequently updated works such as blog entries, news headlines, audio, and video in a standardised format. | + | |:::|RSS is a family of web feed formats used to publish frequently updated works such as blog entries, news headlines, audio, and video in a standardised format. |
|RTM|Requirements Traceability Matrix. | |RTM|Requirements Traceability Matrix. | ||
- | |RTQ|Risk | + | |RTQ|Risk |
|Rule Set Based Access Control|RSBAC.| | |Rule Set Based Access Control|RSBAC.| | ||
|:::|Rule Set Based Access Control targets actions based on rules for entities operating on objects.| | |:::|Rule Set Based Access Control targets actions based on rules for entities operating on objects.| | ||
Line 751: | Line 792: | ||
|UAT|User Acceptance Testing.| | |UAT|User Acceptance Testing.| | ||
|UDF|User Defined Field.| | |UDF|User Defined Field.| | ||
- | |UDP|User Datagram Protocol)| | + | |UDP|User Datagram Protocol| |
|:::|A communications protocol that, like TCP, runs on top of IP networks. | |:::|A communications protocol that, like TCP, runs on top of IP networks. | ||
|UDP Scan|UDP scans perform scans to determine which UDP ports are open.| | |UDP Scan|UDP scans perform scans to determine which UDP ports are open.| | ||
Line 798: | Line 839: | ||
|Windowing|A windowing system is a system for sharing a computer' | |Windowing|A windowing system is a system for sharing a computer' | ||
|Windump|Windump is a freeware tool for Windows that is a protocol analyzer that can monitor network traffic on a wire.| | |Windump|Windump is a freeware tool for Windows that is a protocol analyzer that can monitor network traffic on a wire.| | ||
- | |Wired Equivalent Privacy|WEP. | + | |Wired Equivalent Privacy|WEP.| |
+ | |:::|A security protocol for wireless local area networks defined in the standard IEEE 802.11b.| | ||
|Wireless Application Protocol|A specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, | |Wireless Application Protocol|A specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, | ||
|Wiretapping|Monitoring and recording data that is flowing between two points in a communication system.| | |Wiretapping|Monitoring and recording data that is flowing between two points in a communication system.| |
glossary/start.1689608774.txt.gz · Last modified: 2023/07/17 15:46 by peter