CAT Valley Resourse Center
Next available IT Project Management

 


 

 

 

IT-Glossary
A-Z

Abuse of Privilege: When a user performs an action that they should not have, according to organizational policy or law. 

Access: The ability to enter a secured area. The process of interacting with a system. Used as either a verb or a noun. 

Access Authorization: Permission granted to users, programs or workstations. 

Access Control: A set of procedures performed by hardware, software and administrators to monitor access, identify users requesting access, record access attempts, and grant or deny access. 

Access Mediation:  Process of monitoring and controlling access to the resources of an IT product, including but not limited to the monitoring and updating of policy attributes during accesses as well as the protection of unauthorized or inappropriate accesses.

Access port: A logical or physical identifier that a computer uses to distinguish different terminal input/output data streams.

Access Sharing: Permitting two or more users simultaneous access to file servers or devices. 

Active Attack: An attack which results in an unauthorized state change, such as the manipulation of files, or the adding of unauthorized files.

Administrative Security: The management constraints and supplemental controls established to provide an acceptable level of protection for data.

AIS: Automated Information System - any equipment of an interconnected system or subsystems of equipment that is used in the automatic acquisition, storage, manipulation, control, display, transmission, or reception of data and includes software, firmware, and hardware.

Alert: A formatted message describing a circumstance relevant to network security. Alerts are often derived from critical audit events.

Alphanumeric Key: A sequence of letters, numbers, symbols and blank spaces from one to 80 characters long.

Ankle-Biter: A person who aspires to be a hacker/cracker but has very limited knowledge or skills related to AIS's. Usually associated with young teens who collect and use simple malicious programs obtained from the Internet.

Anomaly Detection Model: A model where intrusions are detected by looking for activity that is different from the user's or system's normal behavior.

Anonymous FTP: A guest account which allows anyone to login to the FTP Server. It can be a point to begin access on the host server. 

ANSI: The American National Standards Institute. Develops standards for transmission storage, languages and protocols. Represents the United States in the ISO (International Standards Organization). 

Antivirus: A virus that specifically looks for and removes another virus.

Application Level Gateway [Firewall]: A firewall system in which service is provided by processes that maintain complete TCP connection state and sequencing. Application level firewalls often re-address traffic so that outgoing traffic appears to have originated from the firewall, rather than the internal host.

Application Logic: The computational aspects of an application, including a list of instructions that tells a software application how to operate. 

ASIM: Automated Security Incident Measurement - Monitors network traffic and collects information on targeted unit networks by detecting unauthorized network activity.

Asymmetric cryptography: In order to use asymmetric cryptography, each person receives a key pair; one public key and one private key. Each person's public key is published, while the private key is kept secret. The need for sender and receiver sharing information about the secret is eliminated. The only requirement is that public keys are associated with their users in a trusted (authenticated) manner Attack: An attempt to subvert or bypass security controls on a computer. The attack may alter, release, or deny data. Whether an attack will succeed depends on the vulnerability of the computer system and the effectiveness of existing countermeasures. Attacks may be active or passive. An active attack attempts to alter or destroy data. A passive attack attempts to intercept and read data without altering it. 

Audit: The independent collection of records to access their veracity and completeness. 

Audit Trail: An audit trail may be on paper or on disk. In computer security systems, a chronological record of when users log in, how long they arc engaged in various activities, what they were doing, whether any actual or attempted security violations occurred. 

Authenticate: In networking, to establish the validity of a user or an object (i.e. communications server). 

Authentication: The process of establishing the legitimacy of a node or user before allowing access to requested information. During the process, the user enters a name or account number (identification) and password (authentication). 

Authentication Tool: A software or hand-held hardware "key" or "token" utilized during the user authentication process. See key and token. 

Authentication Token: A portable device used for authenticating a user. Authentication tokens operate by challenge/response, time-based code sequences, or other techniques. This may include paper-based lists of one-time passwords. 

Authorization: The process of determining what @ of activities are permitted. Usually, authorization is in the context of authentication. Once you have authenticated a user, the user may be authorized different @s of access or activity. 

Automatic Data Processing (ADP) System:  An assembly of computer hardware, firmware, and software configured for the purpose of classifying, sorting, calculating, computing, summarizing, transmitting and receiving, storing, and retrieving data with a minimum of human intervention.

Automated Security Monitoring: All security features needed to provide an acceptable level of protection for hardware, software, and classified, sensitive, unclassified or critical data, material, or processes in the system.

Availability: The portion of time that a system can be used for productive work, expressed as a percentage. 


Back Door: An entry point to a program or a system that is hidden or disguised, often created by the software's author for maintenance. A certain sequence of control characters permits access to the system manager account. If the back door becomes known, unauthorized users (or malicious software) can gain entry and cause damage. 

Backup plan: Synonymous with contingency plan.

Bandwidth: Capacity of a network or data connection, often measured in kilobits/second (kbps) for digital transmissions. 

Bastion Host: A system that has been hardened to resist attack at some critical point of entry, and which is installed on a network in such a way that it is expected to come under attack. Bastion hosts are often components of firewalls, or may be 'outside" Web servers or public access systems. Generally, a bastion host is running some form of general purpose operating system (e.g., LNIX, VMS, WNT, etc.) rather than a ROM-based or firmware operating system.  

BDC: Backup Domain Controller: A copy of PDC information is kept on a "backup" machine to ensure high availability and spread network/system load in Lan Manager domains.  

Bell-La Padula Security Model: Formal-state transition model of computer security policy that describes a formal set of access controls based on information sensitivity and subject authorizations. 

Benign environment:  A nonhostile environment that may be protected from external hostile elements by physical, personnel, and procedural security countermeasures. 

Between-the-lines entry: Unauthorized access obtained by tapping the temporarily inactive terminal of a legitimate user.

Bimodal Virus:  A virus that infects both boot records and files. Also called bipartite or multipartite.

Binding of Security Functionality: The ability of security enforcing functions and mechanisms to work together in a way which is mutually supportive and provides an integrated and effective whole.    Boot: To start a computer so that it is ready to run programs for the user. A PC can be booted either by turning its power on, or by pressing Ctrl+Alt+Del.  

Boot Records: Those areas on diskettes or hard disks that contain some of the first instructions executed by a PC when it is booting. Boot records must be loaded and executed in order to load the operating system. Viruses that infect boot records change the boot records to include a copy of themselves. When the PC boots, the virus program is run and will typically install itself in memory before the operating system is loaded. 

Boot-sector-infecting virus: Some viruses infect the boot records of hard disks and diskettes. They typically do so by replacing the existing boot record with their own code. The virus is executed when the system is booted from the hard disk or diskette, and installs its own code in the system's memory so that it can infect other hard disks or diskettes later. Once that has happened, the virus will usually execute the normal boot program, which it stores elsewhere on the disk.

Biometric Access Control: Any means of controlling access through human measurements, such as fingerprinting and voiceprinting

Block Oriented Encryption:  Encryption methods where the data to be encrypted is divided into blocks of equal length, on which the key is then applied according to the respective method.

Bug: An error in the design or implementation of a program that causes it to do something that neither the user nor the program author had intended to be done.

Business-Critical Applications: The vital software needed to run a business, whether custom-written or commercially packaged, such as accounting/finance, ERP, manufacturing, human resources, sales databases, etc. 

Blue bomb: (also known as "the blue screen of death" or "WinNuke") a technique for causing the Windows operating system of someone you're communicating with to crash or suddenly terminate. The "blue bomb" is actually an out-of-band network packet containing information that the operating system can't process. This condition causes the operating system to "crash" or terminate prematurely. The operating system can usually be restarted without any permanent damage other than possible loss of unsaved data when you crashed. The blue bomb derives its name from the effect it sometimes causes on the display as the operating system is terminating - a white-on-blue error screen. Blue bombs are sometimes sent by multi-player game participants who are about to lose or users of Internet Relay Chat (IRC) who are making a final comment. This is known as "nuking" someone. The program that causes the blue bomb is known as WinNuke. Many Internet service providers are filtering out the packets so they don't reach users.

Buffer overflow:  A buffer overflow occurs when a buffer was assigned by a programmer to hold variable data, and the variable data placed into that buffer exceeds the size of the initial of the buffer assignment. Depending on the operating system and exactly what the "extra" data overflowing the buffer is, this can be used by a hacker to cause portions of a system to fail, or even execute arbitrary code. Most buffer overflow exploits centre around user-supplied data exceeding a buffer, and the extra data being executed on the stack to open up additional access. Buffer overflows exist on all major network operating systems.

Call back:  A procedure for identifying a remote terminal. In a call back, the host system disconnects the caller and then dials the authorized telephone number of the remote terminal to reestablish the connection. Synonymous with dial back.

CERT: The Computer Emergency Response Team was established at Carnegie-Mellon University after the 1988 Internet worm attack. 

Certificate: Digital equivalent of an identity card. It contains, among other things, the name of its owner, the name of the issuing authority, a validity period, and the public part of an asymmetric key pair. With the digital signature from the certification authority, the public key is uniquely linked to its user.

Certification body: An independent and impartial national organization that performs certification. Also referred to as an evaluation body or entity.

Certificate Path: In PKIs, certificates are arranged in a hierarchical structure. The root certification authority's certificate is on the uppermost node. This certification authority certifies other certification authorities where necessary. User certificates are located at the bottom of the hierarchy. So that all users can communicate with each other within this hierarchy, each participant needs the certificate path to the root certification authority. This enables all users to check any certificate within this hierarchy for authenticity and validity.

Certificate Revocation List: (Short: CRL.) List of certificates that have been declared invalid before their expiry date by the issuing CA. The CA maintains this list and is obliged to publish it, i.e. update it regularly and put it at the disposal of all participants.

Challenge/Response: A security procedure in which one communicator requests authentication of another communicator, and the latter replies with a pre-established appropriate reply.

Channel: An information transfer path within a system. May also refer to the mechanism by which the path is effected.

Chroot: A technique under UNIX whereby a process is permanently restricted to an isolated subset of the file system.

Cipher: A cipher is an encryption-decryption algorithm.

Ciphertext: Ciphertext is the product of encryption. It is text that has been encoded in such a way, that it can only be decoded again by individuals possessing the appropriate key.

Client/Device: Hardware that retrieves information from a server.

Closed security environment: An environment in which both of the following conditions hold true: (1) Application developers (including maintainers) have sufficient clearances and authorizations to provide an acceptable presumption that they have not introduced malicious logic and (2) configuration control provides sufficient assurance that applications and the equipment are protected against the introduction of malicious logic prior to and during the operation of system applications. 

Closed user group: A closed user group permits users belonging to a group to communicate with each other, but precludes communications with other users who are not members of the group.

Clustering: Group of independent systems working together as a single system. Clustering technology allows groups of servers to access a single disk array containing applications and data.

Cluster virus: A virus that infects disks or diskettes by modifying their file systems so that every program file entry points to the virus code. The virus code only exists in one physical place on the disk, but running any program on the disk will run the virus as well. So, cluster viruses can appear to infect every program on a disk.

Coded File: In encryption, a coded file contains unreadable information.

COM File: A PC-DOS binary image that is loaded into memory. It has restrictions in size and method of program load. It generally loads somewhat faster than an EXE file and has a simpler structure.

Combined Evaluation: Method using proxy and state or filter evaluations as allowed by administrator.

Communication channel: The physical media and devices which provide the means for transmitting information from one component of a network to (one or more) other components.

Communication link: The physical means of connecting one location to another for the purpose of transmitting and/or receiving data. 

Communications security (COMSEC): Measures taken to deny unauthorized persons information derived from
telecommunications of an entity concerning national or organizational security, and to ensure the authenticity of such
telecommunications. Communications security includes cryptosecurity, transmission security, emission security, and physical security of communications security material and information. 

Communications Server: Procedures designed to ensure that telecommunications messages maintain their integrity and are not accessible by unauthorized individuals.

Companion virus: A virus that creates a new program with the same file name as an existing program, but in a different place or with a different file type, so that typing the program's name on the command line causes the virus program to be executed instead of the original program. For instance, a companion virus could create a file name FOO.COM that contained its code, if a program named FOO.EXE already existed. When the user types FOO on the command line, FOO.COM would get executed instead of FOO.EXE.

Compartment: A designation applied to a type of sensitive information, indicating the special handling procedures to be used for the information and the general class of people who may have access to the information. It can refer to the designation of information belonging to one or more categories. 

Compromise: A violation of the security system such that an unauthorized disclosure of sensitive information may have occurred.

Compromising emanations: Unintentional data-related or intelligence-bearing signals that, if intercepted and analyzed, disclose the information transmission received, handled, or otherwise processed by any information processing equipment. 

Computer abuse: The misuse, alteration, disruption, or destruction of data processing resources. The key aspect is that it is intentional and improper.

Computer architecture: The set of layers and protocols (including formats and standards that different hardware/software must comply with to achieve stated objectives) which define a computer system. Computer architecture features can be available to application programs and system programmers in several modes, including a protected mode. For example, the system-level features of computer architecture may include: (1) memory management, (2) protection, (3) multitasking, (4) input/output, (5) exceptions and multiprocessing, (6) initialization, (7) coprocessing and multiprocessing, (8) debugging, and (9) cache management. 

Computer cryptography: The use of a cryptoalgorithm in a computer, microprocessor, or microcomputer to perform encryption or decryption in order to protect information or to authenticate users, sources, or information. 

Computer Security: Technological and managerial procedures applied to computer systems to ensure the availability, integrity and confidentiality of information managed by the computer system.

Computer security subsystem: A device designed to provide limited computer security features in a larger system environment.

Computer Security Technical Vulnerability Reporting Program (CSTVRP): A program that focuses on technical vulnerabilities in commercially available hardware, firmware and software products acquired by DoD. CSTVRP provides for the reporting, cataloging, and discreet dissemination of technical vulnerability and corrective measure information to DoD components on a need-to-know basis. 

Concealment system: A method of achieving confidentiality in which sensitive information is hidden by embedding it in irrelevant data.

Confidentiality: A message is confidential when its contents can only be read by authorized recipients. Without encryption, message contents can be read by third parties, unnoticed by sender and addressee. By using powerful encryption algorithms it is guaranteed that only entitled recipients can read the contents.

Configuration: Selection of one of the sets of possible combinations of features of a system.

Configuration control: The process of controlling modifications to the system's hardware, firmware, software, and
documentation that provides sufficient assurance that the system is protected against the introduction of improper modifications prior to, during, and after system implementation. Compare configuration management.

Configuration management: The management of security features and assurances through control of changes made to a system's hardware, software, firmware, documentation, test, test fixtures, and test documentation throughout the development and operational life of the system.

Confinement: The prevention of the leaking of sensitive data from a program.

Cookie: The most common meaning of "Cookie" on the Internet refers to a piece of information sent by a Web Server to a Web Browser that the Browser software is expected to save and to send back to the Server whenever the browser makes additional requests from the Server. Depending on the type of Cookie used, and the Browser's settings, the Browser may accept or not accept the Cookie, and may save the Cookie for either a short time or a long time. 

Cross Certification: Process where a CA of one PKI issues a certificate on the public key of a CA of another PKI. Establishes interoperability, since certificates of the latter PKI can be verified by individuals of the former PKI.

Cracker:  A cracker is someone who breaks into someone else's computer system, often on a network. A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or because the challenge is there. Some breaking-and-entering has been done ostensibly to point out weaknesses in a site's security system.

CRC:Cyclic Redundancy Code. A CRC is a type of checksum. A checksum algorithm takes a file (or other string of bytes) and  calculates from it a few bytes (the checksum) that depend on the entire file. The idea is that, if anything in the file changes, the checksum will change. CRC checksums are usually used to detect random, uncorrelated changes in files.

Cryptanalysis: Study of how to defeat (compromise) cryptographic mechanisms. See also: Cryptography and Cryptology.

Cryptography: Mathematical discipline that is concerned with finding methods for keeping communications private, unimpaired, and authentic. Today's cryptography is based on the existence of mathematical problems that are believed (by experts) to be difficult. 

Cryptology: Discipline of cryptography and cryptanalysis combined.

Cryptosystem: A cryptosystem is a system for encrypting and decrypting data. Encryption involves an algorithm for combining the original data (plaintext) with one or more keys - numbers or strings of characters known only to the sender and/or recipient. The resulting output is known as ciphertext. The security of a cryptosystem usually depends on the secrecy of (some of) the keys rather than on the supposed secrecy of the algorithm. A strong cryptosystem has a large range of possible keys so that it is not possible to just try all possible keys. A strong cryptosystem will produce Ciphertext that appears random to all standard statistical tests. A strong cryptosystem will resist all known previous methods for breaking codes (cryptanalysis).

Cryptographic Checksum: A one-way function applied to a file to produce a unique "fingerprint" of the file for later reference. Checksum systems are a primary means of detecting file system tampering on UNIX.

Cryptware: Software that allows performing encryption. and/or decryption of data 


Data Driven Attack: A form of attack in which the attack is encoded in innocuous-seeming data which is executed by a user or other software to implement an attack. In the case of firewalls, a data driven attack is a concern since it may get through the fir-firewall in data form and launch an attack against a system behind the firewall. 

Data Encryption Standard: An encryption standard developed by EBM and then tested and adopted by the National Bureau of Standards. Published in 1977, the DES standard has proven itself over nearly 20 years of use in both government and private sectors. 

Decode: Conversion of encoded text to plain text through the use of a code. 

Decrypt: Conversion of either encoded or enciphered text into plaintext. 

Dedicated: A special purpose device. Although it is capable of performing other duties, it is assigned to only one. 

Defense in Depth: The security approach whereby each system on the network is secured to the greatest possible degree. May be used in conjunction with firewalls.

Daemon: (pronounced and sometimes spelled like "demon") is a program that runs continuously and exists for the purpose of handling periodic service requests that a computer system expects to receive. The daemon program forwards the requests to other programs (or processes) as appropriate. Each server of pages on the Web has an HTTPD or Hypertext Transport Protocol daemon that continually waits for requests to come in from Web clients and their users. 

DES: Data Encryption Standard. Symmetric encryption procedure with 56 bytes key length. DES was developed by IBM and published on January 15, 1977, by NIST.

DES3: Triple-DES-Algorithm: The simple DES algorithm no longer being considered secure, it was extended to the – currently secure – Triple-DES-algorithm. It runs DES three times, either with two or with three different keys, being equivalent to an effective key length of 113 resp. 168 bit.

Digest: A hash value (or digest) is a number generated from a string of text. The hash value is substantially smaller than the text itself, and is generated by a formula in such a way that it is extremely unlikely that some other text will result in the same hash value. Hashing can be used to check the integrity of data: if someone produces a hash value and sends it along with the message, the receiver can produce a hash value on receipt of the message. If the receiver's hash matches the one that was sent along with the message, the original message has not been changed. 

Digital Envelop: A cryptographic technique to encrypt data and send the encryption key along with the data. Generally, a symmetric algorithm is used to encrypt the data and an asymmetric algorithm is used to encrypt the encryption key.

Digital Wallet: Encryption software that works like a physical wallet during electronic commerce transactions. A wallet can hold a user's payment information, a digital certificate to identify the user, and shipping information to speed transactions. The consumer benefits because his or her information is encrypted against piracy and because some wallets will automatically input shipping information at the merchant's site and will give the consumer the option of paying by digital cash or check. Merchants benefit by receiving protection against fraud. Most wallets reside on the user's PC, but recent versions, called "thin" wallets, are placed on the credit card issuer's server. Netscape and Microsoft now support wallet technology on their browsers. 

DoS Denial of Service: A DoS attack is commonly referred to as a "hack" because it is a malicious offensive against another computer system; but unlike most other hacks, it does not involve the attacker gaining access or entry into the target server. Instead, a DoS is a massive stream of information sent to a target with the intention of flooding it until it crashes or can no longer take legitimate traffic. The information is frequently in the form of "pings," which are small packets of data sent by one computer to another with the intention of checking to see if the other computer is accessible. The target computer responds to the ping and the connection is made. But if the pinger gives a false address, the target computer can't return the ping to make the connection. In that case, the target waits and finally gives up. In great amounts, this can overwhelm a server. 

DNS: Domain name service, allows the resolution of hostnames to IP addresses and vice versa in large networks.

DNS Spoofing: Assuming the DNS name of another system by either corrupting the name service cache of a victim system, or by compromising a domain name server for a valid domain. 

Dual Homed Gateway: 1) A system that has two or more network interfaces, each of which is connected to a different network. In firewall configurations, a dual homed gateway usually acts to block or filter some or all of the traffic trying to pass between the networks. 2) A firewall implement without the use of a screening router. 

 E-mail Bombs: Code that when executed sends many messages to the same address(s) for the purpose of using up disk space and/or overloading the E-mail or web server. 

Encryption: The process of scrambling files or programs, changing one character string to another through an algorithm (such as the DES algorithm). 

End-to-End Encryption: Encryption at the point of origin in a network, followed by decryption at the destination. 

Entrapment: The deliberate use of apparent security weakness with the specific purpose of detecting those who are likely to exploit and genuine weakness.

Environment: The aggregate of external circumstances, conditions and events that affect the development, operation and maintenance of a system. 

Ethernet spoofing: Any procedure that involves assuming another host's Ethernet address to gain unauthorized access to the target

EXE File: A PC-DOS executable file similar to a COM file, except that it is not restricted in size (except for memory limitations), and that it may contain relocatable code.

Extranet: "Extranet" refers to extending the LAN via remote or Internet access to partners outside your organization such as frequent suppliers and purchasers.  Such relationships should be over authenticated link to authorized segments of the LAN and are frequently encrypted for privacy." 


Fat Client: A computing device, such as a PC or Macintosh, that includes an operating system, RAM, ROM, a powerful processor and a wide range of installed applications that can execute on the desktop or 100% on the server under a Server-based Computing architecture. Fat clients can operate in a Server-based Computing environment. 

Fault Tolerance: A design method that ensures continued systems operation in the event of individual failures by providing redundant system elements. 

File-infecting virus: Some viruses infect executable files. There are a variety of mechanisms that they use to do so. Usually, the virus will get control when the program is first executed. In most cases, the virus will return control to the original program after it has completed its own execution.

Firewall: A system or combination of systems that enforces a boundary between two or more networks. 

FIRST:  Forum of Incident Response and Security Teams 

Flooding programs: Code which when executed will bombard the selected system with requests in an effort to slow down or shut down the system. 

FTP: FTP (File Transfer Protocol), a standard Internet protocol, is the simplest way to exchange files between computers on the Internet. Like the Hypertext Transfer Protocol (HTTP), which transfers displayable Web pages and related files, and the Simple Mail Transfer Protocol (SMTP), which transfers e-mail, FTP is an application protocol that uses the Internet's TCP/IP protocols. FTP is commonly used to transfer Web page files from their creator to the computer that acts as their server for everyone on the Internet. It's also commonly used to download programs and other files to your computer from other servers.


Gateway: A bridge between two networks. 

Generic Utilities: General purpose code and devices; i.e., screen grabbers and sniffers that look at data and capture information like passwords, keys and secrets. 

Global Security: The ability of an access control package to permit protection across a variety of mainframe environments, providing users with a common security interface to all. 

Granularity: The relative fineness or coarseness by which a mechanism can be adjusted. 


Hack: Any software in which a significant portion of the code was originally another program. 

Hacker: Those intent upon entering an environment to which they are not entitled entry for whatever purpose [entertainment, profit, theft, prank, etc.]. Usually iterative techniques escalating to more advanced methodologies and use of devices to intercept the communications property of another. 

Handshake: Parameter exchange preceding the actual data transmission.

Hash Function: (Also: Hash Algorithm.) Function for computing from any input data a cryptographic checksum of given length. For good hash functions it is extremely improbable to retrieve the input data from the hash value or to find different inputs resulting in the same hash value.

Hashing: Hashing means producing hash values, also called digests, for accessing data or for security. A hash value (or digest) is a number generated from a string of text. The hash value is substantially smaller than the text itself, and is generated by a formula in such a way that it is extremely unlikely that some other text will result in the same hash value. Hashing can be used to check the integrity of data: if someone produces a hash value and sends it along with the message, the receiver can produce a hash value on receipt of the message. If the receiver's hash matches the one that was sent along with the message, the original message has not been changed. 

Hash Value: (Also: Fingerprint.) Result of hash function.

Hybrid Process: Combination of symmetric and asymmetric cryptography. In a first step, the message is encrypted symmetrically, the encryption key used is then encrypted asymmetrically with the recipient's public key, and sent along with the encrypted message. The recipient decrypts with his private key the symmetric encryption key and with this decrypts the message. Recommended for large amounts of data and for encryption for many recipients.

Host:  Any computer that has full two-way access to other computers on the Internet. A host has a specific "local or host number" that, together with the network number, forms its unique Internet Protocol address. If you use PPP to get access to your access provider, you have a unique IP address for the duration of any connection you make to the Internet and your computer is a host for that period. In this context, a "host" is a node in a network.

Host-based Security: The technique of securing an individual system from attack. Host-based security is operating system and version dependent. 

Hot Standby: A backup system configured in such a way that it may be used if the system goes down. 

Hybrid Gateways: An unusual configuration with routers that maintain the complete state of the TCP/IP connections or examine the traffic to try to detect and prevent attack [may involve baston host]. If very complicated it is difficult to attach; and, difficult to maintain and audit. 

ICA: An acronym for Citrix's Independent Computing Architecture, a three-part Server-based Computing technology that separates an application's logic from its user interface and allows 100% application execution on the server. 

IDEA:International Data Encryption Algorithm. Symmetric algorithm, developed at ETH Zürich (Switzerland); works with a key length of 138 bit and is considered to be secure. Non-commercial use is free, for commercial use a license is to be obtained.

IETF: Internet Engineering Task Force. Open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and the smooth operation of the Internet. It is open to any interested individual. The actual technical work of the IETF is done in working groups, which are organized by topic into several areas (e.g., routing, transport, security, etc.). Much of the work is handled via mailing lists. The IETF holds meetings three times per year. Standards are expressed in the form of Requests for Comments (RFCs).

Incident: For purpose of this document the term "incident" implies an incident related to computer security. 
"A computer security incident, [...], is any adverse event whereby some aspect of computer security could be threatened: loss of data confidentiality, disruption of data or system integrity, or disruption or denial of availability." 
The definition of an incident may vary for each organisation depending on many factors. At least the following categories and examples are generally applicable:
Compromise of integrity, such as when a virus infects a program or the discovery of a serious system
vulnerability; 
Denial of service, such as when an attacker has disabled a system or a network worm has saturated network
bandwidth; 
Misuse, such as when an intruder (or insider) makes unauthorized use of an account; 
Damage, such as when a virus destroys data; and 
Intrusions, such as when an intruder penetrates system security. 
Another definition, which relies on the definition of Threat is given by [CERT 1993]:  "an instance of any computer security threat" 

Incident Handling: It depends on the understanding of the author of a document if he makes a difference between Incident Handling and Incident Response. The main reason for making a difference is, that Incident Handling covers more than Incident Response. 

Incident Response: Incident Response is viewed as part of Incident Handling. All actions related to the first reaction on a new incident are covered. 

Information Systems Technology: The protection of information assets from accidental or intentional but unauthorized disclosure, modification, or destruction, or the inability to process that information. 

Insider Attack: An attack originating from inside a protected network. 

Integrity: That aspect of security that deals with the correctness of information or its processing. An attack on integrity would seek to erase a file that should not be erased, alter an element of a database improperly, corrupt the audit trail for a series of events, propagate a virus, etc.

Internet (The Beginning): The Internet had its roots in early 1969 when the ARPANET was formed. ARPA stands for Advanced Research Projects Agency (which was part of the U.S. Department of Defense). One of the goals of ARPANET was research in distributed computer systems for military purposes. The first configuration involved four computers and was designed to demonstrate the feasibility of building networks using computers dispersed over a wide area. The advent of OPEN networks in the late 1980's required a new model of communications. The amalgamation of many types of systems into mixed environments demanded better translator between these operating systems and a non-proprietary approach to networking in general. Telecommunications Protocol/Internet Protocol {TCP/IP) provided the best solutions to this. 

Internet (TOM): A web of different, intercommunicating networks funded by both commercial and government organizations. It connects networks in 40 countries. No one owns or runs the Internet. There are thousands of enterprise networks connected to the Internet, and there are millions of users, with thousands more joining every day. 

Internet Protocol: handles the address part of each data packet that is transmitted from one computer to another on the Internet. (A protocol is the set of rules computers use to talk to each other.) Each computer (or host) on the Internet has a unique address containing four numbers separated by periods (for example, 199.0.0.2). Each file you request (for example, someone's Web home page) is identified in part by a domain name that maps to the Internet address of its computer. The file you request is in turn sent to you at your associated Internet address by the IPs at either end of the exchange.

Intranet: Closed, non-public network that is contained e.g. within an enterprise.

IPSec: Internet Protocol Security. Protocol (based on the IP) to ensure authenticity, privacy, and integrity during data exchange.

Intrusion Detection: Detection of break-ins or break-in attempts either manually via software expert systems that operate on logs or other information available on the network. 

IP address: In the most widely installed level of the Internet Protocol (IP) today, an IP address is a 32-bit number that identifies each sender or receiver of information that is sent in packets across the Internet. When you request an HTML page or send e-mail, the Internet Protocol part of TCP/IP includes your IP address in the message (actually, in each of the packets if more than one is required) and sends it to the IP address that is obtained by looking up the domain name in the URL you requested or in the e-mail address you're sending a note to. At the other end, the recipient can see the IP address of the Web page requestor or the e-mail sender and can respond by sending another message using the IP address it received. 

IP Sniffing: Stealing network addresses by reading the packets. Harmful data is then sent stamped with internal trusted addresses. 

IP Spoofing: An attack whereby an active, established, session is intercepted and co-opted by the attacker. EP Splicing attacks may occur after an authentication has been made, permitting the attacker to assume the role of an already authorized user. Primary protections against IP Splicing rely on encryption at the session or network layer. 

IP Spoofing: An attack whereby a system attempts to illicitly impersonate another system by using its EP network address. 

IRT:  Incident Response Team. Similar to CSIRC and IHT this is another acronym for CERTs

ISO: International Standards Organization sets standards for data communications. 

ISSA: Information Systems Security Association. 


Key: In encryption, a key is a sequence of characters used to encode and decode a file. You can enter a key in two formats: alphanumeric and condensed (hexadecimal). In the network access security market, "key" often refers to the "token," or authentication tool, a device utilized to send and receive challenges and responses during the user authentication process. Keys may be small, hand-held hardware devices similar to pocket calculators or credit cards, or they may be loaded onto a PC as copy-protected, software. 

Key Recovery: General term encompassing numerous ways of permitting emergency access to cryptographic keys, e.g. if a key is lost, by cryptographic techniques.


LDAP: Lightweight Directory Access Protocol. Protocol with which access to directory services is given, used to query, for example, certificates or e-mail addresses.

Least Privilege: Designing operational aspects of a system to operate with a minimum amount of system privilege. This reduces the authorization level at which various actions are performed and decreases the chance that a process or user with high privileges may be caused to perform unauthorized activity resulting in a security breach. 

Load balancing: Distributing processing and communications activity evenly across a computer network so that no single device is overwhelmed. Load balancing is especially important for networks where it's difficult to predict the number of requests that will be issued to a server. Busy Web sites typically employ two or more Web servers in a load balancing scheme. If one server starts to get swamped, requests are forwarded to another server with more capacity. Load balancing can also refer to the communications channels themselves. 

Local Area Network (LAN): An interconnected system of computers and peripherals, LAN users share data stored on hard disks and can share printers connected to the network. 

Logging: The process of storing information about events that occurred on the firewall or network. 

Logic bomb: Any program or code, generally malicious, that causes a system to lock up or fail. 

Log Processing: How audit logs are processed, searched for key events, or summarized. 

Log Retention: How long audit logs are retained and maintained. 


Mail Bomb: The mail sent to urge others to sent massive amounts of e-mail to a single system or person, with the intent to crash the recipient's system. 

MFT: Multi Functional Terminal. A client/server system from Unisys (B38 terminal) which runs the CTOS operating system. Used for making contracts, accessing Terco and word-processing. 3270 and VT emulators are available.

Mobile Code: A program downloaded from the internet that runs automatically on a computer with little or no user interaction.

Multi-User: The ability for multiple concurrent users to log on and run applications from a single server.  

Master Boot Records:  Those boot records on PC hard disks that define the structure of the information on the disk. There is only one master boot record on each physical hard disk. Each logical disk drive (C:) has a system boot record associated with it.


Network Computer (NC): A "thin" client hardware device that executes applications locally by downloading them from the network. NCs adhere to a specification jointly developed by Sun, IBM, Oracle, Apple and Netscape. They typically run Java applets within a Java browser, or Java applications within the Java Virtual Machine. 

Network Computing Architecture: A computing architecture in which components are dynamically downloaded from the network into the client device for execution by the client. The Java programming language is at the core of network computing. 

Network-Level Firewall: A firewall in which traffic is examined at the network protocol packet level.

Network Worm: A program or command file that uses a computer network as a means for adversely affecting a system's integrity, reliability or availability, A network worm may attack from one system to another by establishing a network connection. It is usually a self-contained program that does not need to attach itself to a host file to infiltrate network after network.

NSA: National Security Agency. US-American governmental agency with a mandate to listen to and decode foreign communications of interest to US security. Controls the export of cryptographic products.

Nuking: a technique for causing the Windows operating system of someone you're communicating with to crash or suddenly terminate. The "nuke" is actually an out-of-band network packet containing information that the operating system can't process. This condition causes the operating system to "crash" or terminate prematurely. The operating system can usually be restarted without any permanent damage other than possible loss of unsaved data when you crashed

One-Time Password: In network security, a password issued only once as a result of a challenge-response authentication process. Cannot be "stolen" or reused for unauthorized access.

OOB:  (Out of Band) the urgent data transmission method that is exploited in WinNuke's.

Operating System: System software that controls a computer and its peripherals. Modern operating systems such as Windows 95 and NT handle many of a computer’s basic functions.

Orange Book: The Department of Defense Trusted Computer System Evaluation Criteria. It provides information to classify computer systems, defining the degree of trust that may be placed in them.


 

Packet sniffer: A device or program that monitors the data traveling between computers on a network. 

Password: A secret code assigned to a user. A@ known by the computer system. Knowledge of the password associated with the user ID is considered proof of authorization. (See One-Time Password.)

Password sniffing: The use of a sniffer to capture passwords as they pass across a network. The network could be a local area network. The network could be a local area network, or the Internet itself. The sniffer could be hardware or software. A favorite method for installing a password sniffer onto a local area network would be trough the use of a Trojan Horse.

PDC: Primary Domain Controller: The principal NT server containing user account information in a domain.

PEM: Privacy Enhanced Mail. Format for the digital signing of texts and the sending of certificates. Additionally, encryption can be carried out. The format is framed in such a way that it can be sent regardless of the transport path and the e-mail applications. PEM documents are suited for local verification of signatures and privacy because they keep their security enhancements after being received. Thus PEM serves well for document security in general. (See also MailTrusT.)

Performance: A major factor in determining the overall productivity of a system, performance is primarily tied to availability, throughput and response time. 

Perimeter-based Security: The technique of securing a network by controlling access to all entry and exit points of the network.

PGP: Pretty Good Privacy. Developed 1991 by Phil Zimmermann. PKI based on mutual trust between the participants; used mainly by individuals in the non-commercial sector.

Piggyback attack: The gaining of unauthorized access to a system via an another user's legitimate connection. 

PIN: In computer security, a personal identification number used during the authentication process. Known only to the user. (See Challenge/Response, Two-Factor Authentication.) 

Ping: (Packet Internet Groper) a basic Internet program that lets you verify that a particular Internet (IP) address exists and can accept requests. The verb ping means the act of using the ping utility or command. Ping is used diagnostically to ensure that a user's PC is properly connected to the Internet. If, for example, a user can't ping a host, then the user will be unable to use a browser or any other TCP/IP application with that host. Ping can also be used to learn the number form of the IP address from the symbolic domain name.

Ping of Death: The Ping of Death is a denial-of-service attack that crashes servers by sending invalid IP ping packets. 

PKCS: Public Key Cryptography System, Public Key Cryptography Standards. Collection of standards for the exchange of information via the Internet.

Policy: Organizational-level rules governing acceptable use of computing resources, security practices, and operational procedures.

Port: An electronic connection that allows data to travel between a client PC and a server on the network.

Port Scan: Data sent by the cracker over the Internet to locate a PC or network and determine whether it has open ports that will accept a connection.

Private Key: In encryption, one key (or password) is used to both lock and unlock data. Compare with public key.

Privacy: Privacy of data means that only persons who are entitled to can read these data. The transport protocols usually used in networks cannot prevent unauthorized persons to read data undetected. Using strong cryptography, however, can guarantee privacy.

Protocols: Agreed-upon methods of communications used by computers.

Prototype Certificate: Certificate containing a signature that has been generated by one's own private key. Only after certification of the prototype certificate by a CA does it become a real certificate.

Proxy: 1) A method of replacing the code for service applications with an improved version that is more security aware. Preferred method is by "service communities", i.e. Oracle, rather than individual applications. Evolved from socket implementations. 2) A software agent that acts on behalf of a user. Typical proxies accept a connection from a user, make a decision as to whether or not the user or client IP address is permitted to use the proxy, perhaps does additional authentication, and then completes a connection on behalf of the user to a remote destination.

Public Key: In encryption a two-key system in which the key used to lock data is made public, so everyone can "lock." A second private key is used to unlock or decrypt.

Public Key Infrastructure (PKI) : The set of hardware, software, people, policies, and procedures needed to create, manage, store, distribute, and revoke certificates based on public key cryptography. A PKI where users are certified by a superior CA enables an authenticated communication, provided that the users have a common point of trust.


RAS: Remote Access Service: Microsoft's utility for connecting computers over Dialup lines or for connecting laptops.

RC4: A cipher designed by RSA Data Security, Inc., which can accept keys of arbitrary length, and is essentially a pseudo random number generator with the output of the generator being XORed with the data stream to produce the encrypted data. For this reason, it is very important that the same RC4 key never be used to encrypt two different data streams. The algorithm is very fast, its security is unknown, but breaking it does not seem trivial either. 

Registry:  the space where Windows stores most application and system data.  Stored in the file system.1st and accessible through the program regedit.

Registration Authority: Registers users' requests for certification and passes them to the relevant CA for issuance. Takes charge of the administration of the issued user certificates

Remote Access: The hookup of a remote computing device via communications lines such as ordinary phone lines or wide area networks to access network applications and information.

Remote Presentation Services Protocol: A protocol is a set of rules and procedures for exchanging data between computers on a network. A remote presentation services protocol transfers user interface, keystrokes, and mouse movements between a server and client. 

Replicator: Any program that acts to produce copies of itself examples include, a worm, a fork bomb or virus. It is even claimed by some that UNIX and C are the symbiotic halves of an extremely successful replicator

Resident Extension: In PC-DOS, programs can install a part of themselves in memory, and this part can remain active after the program has ended. This memory resident part is called a resident extension, since it is effectively an extension to the operating system. Many viruses install themselves as resident extensions, which will then look for files to infect when those files are accessed or executed later.

Revocation: For several reasons a certificate may need to be revoked, i.e. need to be declared invalid prior to the expiration of the validity period. Circumstances which might cause a certificate revocation could be, e.g., if the holder's name changes, if association between subject and CA changes, if the secret key is compromised or is suspected to be compromised, or if the holder misuses his certificate.

Risk Analysis: The analysis of an organization's information resources, existing controls and computer system vulnerabilities. It establishes a potential level of damage in dollars and/or other assets.

Rogue program: Any program intended to damage programs or data. Encompasses malicious Trojan Horses.

Root Authority: (Also: Root CA.) Certification authority that is not certified by any other CA. Its certificate is signed by its own private key. See also Root Certificate.

Root Certificate: Certificate of the highest certification authority of a hierarchy (root authority). It is the basis of all trust in a hierarchical PKI. A PSE with certificate is tightly bound to the certification hierarchy and the root certificate. The tight binding allows trustworthy communications with other partners, even when they have been certified by subordinate certification authorities.

Rootkit:  A hacker security tool that captures passwords and message traffic to and from a computer. A collection of tools that allows a hacker to provide a backdoor into a system, collect information on other systems on the network, mask the fact that the system is compromised, and much more. Rootkit is a classic example of Trojan horse software. 

Router:  a device or, in some cases, software in a computer, that determines the next network point to which a packet should be forwarded toward its final destination. The router is connected to at least two networks and decides which way to send each information packet based on its current understanding of the state of the networks it is connected to. A router is located at any juncture networks or gatway, including each Internet point of presence. A router is often included as part of a network switch.

RSA: A public key cryptosystem named by its inventors, Rivest, Shamir and Adelman, who hold the patent.

 

S/MIME: Secure/Multipurpose Internet Mail Extensions, S/MIME provides a standard way to send and receive secure electronic mail. Based on the popular Internet MIME standard (RFC 1521), S/MIME provides authentication, message integrity, privacy and non-repudiation of origin of electronic messages, using digital signatures and encryption.

Satan: Security administrator's tools for analyzing networks. A TCP/IP port scanner that checks remote hosts for common misconfiguration problems and security vulnerabilities.

Self-Extracting Files: A file which, when run, decompresses part of itself into one or more new files. It is common to store and transmit groups of files in a self-extracting file to conserve both disk space and transmission time. If infected files are compressed into a self-extracting file, anti-virus programs that only scan files will not necessarily be able to detect the virus. To scan such files, you must first extract and then scan their constituent files. 

Self-Garbling Viruses: Some viruses attempt to hide from virus scanning programs by keeping most of their code garbled in some way, and changing the garbling each time they spread. When such a virus runs, a small header degarbles the body of the virus and then branches to it. 

Server: The control computer on a local area network that controls software access to workstations, printers and other parts of the network. 

Server-based Computing: An innovative, server-based approach to delivering business-critical applications to end-user devices, whereby an application’s logic executes on the server and only the user interface is transmitted across a network to the client. Its benefits include single-point management, universal application access, bandwidth-independent  performance, and improved security for business applications.

Server certificate: A digital document attesting to the binding of a given server to a given company or organization.

Server Farm: A group of servers that are linked together as a ‘single system image’ to provide centralized administration and horizontal scaleability

Session Shadowing: A feature of Citrix WinFrame and MetaFrame that allows administrators and technical support staff to remotely join or take control of a user’s session for diagnosis, support and training. 

SET: Short for Secure Electronic Transaction, a new standard that enables secure credit card transactions on the Internet. SET has been endorsed by virtually all the major players in the electronic commerce arena, including Microsoft, Netscape, Visa, and Mastercard. By employing digital signatures, SET will enable merchants to verify that buyers are who they claim to be. And it will protect buyers by providing a mechanism for their credit card number to be transferred directly to the credit card issuer for verification and billing without the merchant being able to see the number.

Scalability: The ability to expand a computing solution to support large numbers of users without impacting performance. 

Screened Host Gateway: A host on a network behind a screening router. The degree to which a screened host may be accessed depends on the screening rules in the router. 

Screened Subnet: An isolated subnet created behind a screening router to protect the private network. The degree to which the subnet may be accessed depends on the screening rules in the router.

Screening Router: A router configured to permit or deny traffic using filtering techniques; based on a set of permission rules installed by the administrator. A component of many firewalls usually used to block traffic between the network and specific hosts on an IP port level. Not very secure; used when "speed" is the only decision criteria.

Signature:  A search pattern, often a simple string of bytes, that is expected to be found in every instance of a particular virus. Usually, different viruses have different signatures.

Stealth Viruses: Some viruses attempt to hide from detection programs by hiding their presence in boot records or files. When such viruses are run, they install a resident extension. This resident extension intercepts various disk accesses, determines if its own code is part of the disk access, and removes the code before giving the data to the calling program. The result is that the virus can be in several places on the disk, but normal reads of the disk will not reveal it.

System Boot Records: Each logical PC-DOS or OS/2 drive (e.g. C:, D:, etc.) has a system boot record associated with it. The system boot record contains code that tells the system about that logical drive and tables that contain an index to the files on it. 

Single-Point Control: Helps reduce the total cost of application ownership by enabling applications and data to be deployed, managed and supported at the server. Single-point control enables application installations, updates and additions to be made once, on the server, which are then instantly available to users anywhere. 

Smart Card: A credit-card-sized device with embedded microelectronics circuitry for storing information about an individual. This is not a key or token, as used in the remote access authentication process.

S/MIME: Secure Multipurpose Internet Mail Extension. The new standard for security enhancement of e-mail is S/MIME. The advantage (as opposed to PEM and MailTrusT) lies in its ability to transport complete mails with attachments in one security package.

Smurfing: A denial of service attack in which an attacker spoofs the source address of an echo-request ICMP (ping) packet to the broadcast address for a network, causing the machines in the network to respond en masse to the victim thereby clogging its network

Sniffer:  A sniffer is a program that monitors and analyzes network traffic, detecting bottlenecks and problems. Using this information, a network manager can keep traffic flowing efficiently. A sniffer can also be used illegitimately to capture data being transmitted on a network. A network router reads every packet of data passed to it, determining whether it is intended for a destination within the router's own network or whether it should be passed further along the Internet. A router with a sniffer, however, may be able to read the data in the packet as well as the source and destination addresses.

Socket: the endpoint in a connection. Sockets are created and used with a set of programming requests or "function calls" sometimes called the sockets application programming interface (API). The most common sockets API is the Berkeley UNIX C language interface for sockets. Sockets can also be used for communication between processes within the same computer.

Social Engineering: An attack based on deceiving users or administrators at the target site. Social engineering attacks are typically carried out by telephoning users or operators and pretending to be an authorized user, to attempt to gain illicit access to systems.

Spoof: 1) To deceive for the purpose of gaining access to someone else's resources (for example, to fake an Internet address so that one looks like a certain kind of Internet user) 2) To simulate a communications protocol by a program that is interjected into a normal sequence of processes for the purpose of adding some useful function

SSL: This protocol is designed to create a secure connection to the server. SSL uses public key encryption, one of the strongest encryption methods around, to protect data as it travels over the Internet. SSL was created by Netscape.

Spam: To crash a program by overrunning a fixed-site buffer with excessively large input data. Also, to cause a person or a newsgroup to be flooded with irrelevant or inappropriate messages.

State Full Evaluation: Methodology using mixture of proxy or filtering technology intermittently depending upon perceived threat [and/or need for "speed"].

Stealth Mode: A protective setting that hides a port so that it isn't visible over the Internet. A port that has been put into stealth mode will give no reply to a port scan, thereby providing no evidence that a computer exists at the scanned IP address.

Stream Oriented Encryption: Encryption methods where the key is expanded to the length of the data to be transmitted.

Strong authentication: Authentication is the verification of the identity of a person or process. In a communication system, authentication verifies that messages really come from their stated source, like the signature on a (paper) letter. Strong authentication uses a combination of items belonging to two out of the three following categories: Personal knowledge: something the authorized user knows (password, PIN) Personal objects: something that belongs to the authorized user (token, card, key) Personal characteristics: something uniquely characterizing the authorized user (physical characteristics e.g. voice, length of fingers…) 

Symmetric cryptography: Cryptography based on the sender and the receiver knowing and using the same secret key. The sender uses it to encrypt the message, the receiver uses the same secret key to decrypt the message. The main problem is that the sender and the receiver have to agree on the secret key without anyone else finding out. Mostly asymmetric cryptography is used to solve this problem.

SYN Flood attack: A SYN Flood attack is when the client does not response to the SYN-ACK, tying up the service until the service times out, and continues to send SYN packets. The source address of the client is forged to a non-existent host, and as long as the SYN packets are sent faster than the timeout rate of the TCP stack waiting for the time out, the resources of the service will be tied up.

Sysop:  A sysop is the person who runs a computer server. The term is used mainly in the world of bulletin board services (BBSs) . In general, a sysop or system operator is one who runsthe day-to-day operation of a server and the term suggests a person who is available when the system is. A related term is administrator. In larger computer systems, the administrator manages security and user access while a system operator monitors and performs routine operations at the computer. In smaller computer systems (for example, UNIX systems), the administrator and the system operator tend to be the same person.


TCB: Trusted Computing Base: The Orange Book (TCSEC) classes use the notion of a Trusted Computing Base (or TCB) extensively. This is the central part of the system (e.g. the kernel) which is trusted to carry out security functions.

TCO: Total Cost of Ownership, a model that helps IT professionals understand and manage the budgeted (direct) and unbudgeted (indirect) costs incurred for acquiring, maintaining and using an application or a computing system. TCO normally includes training, upgrades, and administration as well as the purchase price. Lowering TCO through single-point control is a key benefit of Server-based Computing. 

TCP/IP: Transmission Control Protocol / Internet Protocol: This suite of protocols, originally developed for the Internet, is now the standard enterprise network protocol.

Telnet: the way you can access someone else's computer, assuming they have given you permission. (Such a computer is frequently called a host computer.) More technically, Telnet is a user command and an underlying TCP/IP protocol for accessing remote computers. The Web or HTTP protocol and the FTP protocol allow you to request specific files from remote computers, but not to actually be logged on as a user of that computer. With Telnet, you log on as a regular user with whatever privileges you may have been granted to the specific applications and data on that computer.

Thin Client: A low-cost computing device that works in a server-centric computing model. Thin clients typically do not require state-of-the-art, powerful processors and large amounts of RAM and ROM because they access applications from a central server or network. Thin clients can operate in a Server-based Computing environment.

Threat: As defined by [CERT 1993] "any circumstances or event that has the potential to cause harm to a system or network"  That means, that even the existance of a(n unknown) vulnerability implies a threat by definition. 

Token: A "token" is an authentication too, a device utilized to send and receive challenges and responses during the user authentication process. Tokens may be small, hand-held hardware devices similar to pocket calculators or credit cards. See key. 

Traceroute:  A TCP/IP program common to UNIX that traces the route between your machine and a remote host.
Traffic analysis: Traffic analysis is the study of patterns in communication rather than the content of the communication. For example, studying when, where, and to whom particular messages are being sent, without actually studying the content of those messages. Traffic analysis can be revealing, primarily in determining relationships between individuals and hosts.

TransportPassword: A newly issued PSE is encrypted by CA Management with a Transport Password. This password protects the PSE on its way from the CA to the user. The user is informed of the password by the CA (e.g. by a letter) and is advised to change it immediately after receiving the PSE

TripleDES (3DES): DES, Data Encryption Standard is a symmetrical key algorithm originally developed at IBM. When used for communication, both sender and receiver must know the same secret key, which is used both to encrypt and decrypt the message. DES has a 64 bit block size and uses a 56 bit key during encryption. 3DES (TripleDES) has been developed to provide stronger security. With 3DES, the plaintext is encrypted, three times with the DES algorithm to provide stronger security than DES. The effective key length becomes 112 bit, instead of the 56 bit DES key. 

Trojan Horse: 1) Any program designed to do things that the user of the program did not intend to do or that disguises its harmful intent. 2) Program that installs itself while the user is making an authorized entry; and, then are used to break-in and exploit the system.

Tunneling Router: A router or system capable of routing traffic by encrypting it and encapsulating it for transmission across an untrusted network, for eventual de-encapsulation and decryption.

Turn Commands: Commands inserted to forward mail to another address for interception.

Two-Factor Authentication: Two-factor authentication is based on something a user knows (factor one) plus something the user has (factor two). In order to access a network, the user must have both "factors" - just as he/she must have an ATM card and a Personal Identification Number (PIN) to retrieve money from a bank account, In order to be authenticated during the challenge/response process, users must have this specific (private) information.


UDP:  a communications transport protocol layer that is an alternative to the Transmission Control Protocol (TCP) layer. Like TCP, it interfaces with the Internet Protocol (IP) layer. UDP, however, does not provide the data gathering reliability of TCP. For example, it doesn't provide sequencing of the packets that the data arrives in. This means that the application program must be able to provide these services.

USB: Universal Serial Bus: a 12Mbps serial bus for PC peripherals designed for low and medium speed devices such as keyboards, monitors, tape drives, etc.

User: Any person who interacts directly with a computer system. 

User ID: A unique character string that identifies users.

User Identification: User identification is the process by which a user identifies himself to the system as a valid user. (As opposed to authentication, which is the process of establishing that the user is indeed that user and has a right to use the system.)

User Interface: The part of an application that the user works with. User interfaces can be text-driven, such as DOS, or graphical, such as Windows.


Variant: A modified version of a virus that is usually produced on purpose by a virus author or by someone who modifies the original virus. Variants may be very similar to their parent virus, or may be fairly different. Some are text variants, which means that the only differences between them and their parent virus are in internal program comments that are never displayed, or in text that is displayed to the screen. Some are the result of small changes made to the original virus, apparently to create a new virus which is not detected by certain anti-virus programs. Some are the result of large changes, such as combining the spreading part of one virus with the damage part of another. 

Virtual Network Perimeter: A network that appears to be a single protected network behind firewalls, which actually encompasses encrypted virtual links over untrusted networks.

Virus: A self-replicating code segment. Viruses may or may not contain attack programs or trapdoors.

Vulnerability: This term refers to any weakness in any system ( either hardware or software) that allows intruders to gain unauthorized access or deny service.


Warez (pronounced as though spelled "wares" or possibly by some pronounced like the city of "Juarez") is a term used by software "pirates" to describe software that has been stripped of its copy-protection and made available on the Internet for downloading. People who create warez sites sometimes call them "warez sitez" and use "z" in other pluralizations. Whitemail: The dissemination of false information for financial gain via e-mail. 

WinNuke: see "blue bomb"

Worm:  A program that makes copies of itself elsewhere in a computing system. These copies may be created on the same computer, or may be sent over networks to other computers. The first use of the term described a program that copied itself benignly around a network, using otherwise-unused resources on networked machines to perform distributed computation. Some worms are security threats, using networks to spread themselves against the wishes of the system owners and disrupting networks by overloading them. 


X.509:  X.509 is the standard for user certificates. The public key of a user, together with identification information, is enciphered with the private key of the certificate authority that issued it. So, in fact, the CA digitally signs the public key of the user. The public key of the CA is distributed universally, to allow everyone to verify the user certificate.
 


Y: To be updated


Z: To be updated