Glossary

802.11

A set of IEEE standards that describe wireless LAN/MAN protocols.

802.1x

An IEEE standard for port-based authentication.

AAA

Authentication, authorization, and auditing.

ACL

Access control list.

AD

Active Directory. A Microsoft database of user and group information.

ADS

Alternate data stream. A file construct in Microsoft Windows.

AIM

America Online Instant Messenger.

AIX

Advanced Interactive eXecutive. IBM’s version of UNIX.

AP

Access point. A device that connects wireless radio equipped endpoints with a wired network.

API

Application programming interface.

ATM

Asynchronous Transfer Mode. A protocol that uses fixed-length packets.

ATM

Automated teller machine.

attack surface

A combination of applications and systems available to attack.

attack vector

An entry point for attack or the chosen mode used to exploit a vulnerability or flaw in an application or operating system that can be used to subvert or co-opt an endpoint or network.

bang-bang

A bimodal control that is either on or off.

bluetooth

A short-range radio transceiver system designed to connect peripherals to devices (for example, a headset to a smartphone).

BOOTP

Bootstrap Protocol. RFC 951. A UDP-based protocol used by network endpoints to obtain an IP address.

bot

Web robots are automated applications that carry out repetitive tasks, such as collecting personal information or sending spam. The usage here implies malicious intent and behavior.

botnet

A group of bots controlled by a central source.

BSD

Berkeley Software Distribution. A version of UNIX developed at the University of California, Berkeley.

C++

A computer programming language.

CD-ROM

Compact disc read-only memory. An optical read-only method for distributing digital information.

CERT

Computer Emergency Response Team.

CLPC

Closed-loop process control, a method for analyzing and controlling a system (in this case, a network).

CNAC

Cisco Network Admission Control. Cisco’s proprietary version of NAC.

CSI

Computer Security Institute.

CVE

Common Vulnerabilities and Exposures. An index of standardized names for vulnerabilities.

DHCP

Dynamic Host Configuration Protocol. RFC 2131. DHCP provides required IP configuration information to requesting endpoints.

DMZ

Demilitarized zone. In network contexts, it is a portion of the network that the firewall provides to allow controlled Internet access to corporate network resources.

DNA

In genetics, DNA is deoxyribonucleic acid, the building blocks of life. When referenced in this book, it means the basic settings of the system.

DNP

Distributed Network Protocol used between remote terminal units.

DOS

Disk Operating System.

DSL

Digital Subscriber Line is a method of connecting a computer or site to the Internet.

DVD

Digital video disc. A high-capacity optical read-only data storage medium originally designed for movies but has since been adapted to general data storage.

EAP

Extensible Authentication Protocol. RFC 3748. A universal authentication framework used in point-to-point connections and wireless networks.

embedded system

Any purpose-built computing system.

EVDO

Evolution-Data Optimized. A wireless radio broadband standard adopted by some CDMA cellular mobile phone providers.

FBI

Federal Bureau of Investigation.

firewall

A device that separates and controls traffic from one security zone to another.

FUD

Fear, uncertainty, and doubt. Scare tactics used to instill fear in potential customers.

GLBA

Gramm-Leach-Bliley Financial Services Modernization Act, Pub. L. No. 106-102, 113 Stat. 1338.

GPRS

General Packet Radio Service. A mobile data service available to GSM users.

GUI

Graphic user interface.

HFS

Hierarchical File System used in the Mac OS X operating system.

HI

Host integrity. A function used to determine whether a system has complied with a stated level of policy.

HIDS

Host-based intrusion detection system.

HIPAA

Health Insurance Portability and Accountability Act, Pub. L. No. 104-191.

HP-UX

Hewlett Packard UNIX.

HVAC

Heating, ventilation, and air-conditioning system in a building or structure.

ICMP

Internet Control Message Protocol. RFC 792. Used in network diagnostics and for routing.

IPM

Intellectual property management or rights management.

IRIX

A System V-based UNIX with BSD extensions produced by Silicon Graphics.

kernel

The section of code that provides the core functionality for an operating system.

LAN

Local area network.

LDAP

Lightweight Directory Access Protocol. LDAP systems store user authentication and authorization information similar to AD.

LEAP

Lightweight Extensible Authentication Protocol. A Cisco proprietary wireless authentication protocol.

library

Predefined sections of code that provide services to programs and the operating systems.

malware

Any piece of software that has malicious intent.

MAN

Metropolitan area network.

MBps

Megabytes per second.

MD5

Message Digest 5. A one-way, fixed-length output cryptographic function.

NAC

Network access control. Generally used in 802.1x authentication.

NAP

Network Access Protection. A Microsoft proprietary network access control.

NetBIOS

Network Basic Input Output System. Microsoft networking.

NIDS

Network intrusion detection system.

NMS

Network management system.

NOC

Network operations center.

OEM

Original equipment manufacturer.

OS X

Apple’s operating system, version 10.

P2P

Peer-to-peer protocol or application.

PBX

Private branch exchange. System used to route phone calls in businesses.

PC

Personal computer.

PCI

Payment Card Industry, a standard to evaluate merchants and their network security.

PDA

Personal digital assistant. A handheld endpoint.

PID

Proportional, integral, derivative. The three basic control modes used in CLPC.

PLC

Programmable logic controller. A computer designed to control things such as valves, gates, motors, and switches.

PM

Patch management.

précis

A concise summary of a book, article, or other text.

RADIUS

Remote Authentication Dial In User Service. AAA system for network access.

ROI

Rate of infection or return on investment. When used in the context of viruses, it describes the rate of infection.

rootkit

A tool or set of tools designed to conceal unauthorized processes from detection by the operating system and other tools.

RTU

Remote terminal unit.

SANS

Sysadmin, Audit, Network, and Security Institute. Professional training and certification.

SCADA

Supervisory Control And Data Acquisition system monitor and PLC manager.

script kiddie

A derogatory term for inexperienced hackers who use prewritten scripts.

SDLC

System development life cycle.

SEC

Securities and Exchange Commission.

set-point

The desired value in a closed-loop process control system.

SLA

Service level agreement.

SMB

Server Message Block. An application protocol designed to share access to resources such as printers and file shares.

snarfing

The capturing of network packets.

sniffer

A device or software that monitors the network and captures packets based on specified criteria.

SNMP

Simple Network Management Protocol. A protocol suite used by an NMS to monitor network infrastructure devices.

solaris

Sun Microsystems version of UNIX.

SOx

Sarbanes-Oxley Act of 2002. Pub. L. No. 107-204, 116 Stat. 745. The Public Company Accounting Reform and Investor Protection Act of 2002.

SP

Smartphone.

SQL

Structured Query Language. A standard language used to insert, extract, and manipulate data in a database management system.

SSH

Secure Shell. An application that uses a secure channel to connect endpoints.

SSLF

Specialized Security, Limited Functionality. A very severe Microsoft security configuration.

SUID/SGID

Set user ID / Set group ID. A mode bit in UNIX and UNIX-like systems that allows programs to inherit permissions.

TCG

Trusted Computing Group.

TCP

Transmission Control Protocol. TCP works with the IP protocol to ensure packet delivery. Sometimes referred to as TCP/IP.

TLS

Transport Layer Security. A successor to the Secure Sockets Layer protocol that provides a secure communications channel between two endpoints.

TPM

Trusted Platform Module. Part of the TCG initiative, the TPM is a hardware device that securely stores critical security parameters, such as keys and certificates, in an endpoint such as a notebook computer.

trojan horse

An application that conceals its true intent or behavior by masquerading as another application.

TSA

Transportation Security Administration.

TTR

Time to replicate. The time it takes a virus to replicate itself in another system.

UDP

User Datagram Protocol. UDP works with the IP protocol to deliver packets on a best effort (unguaranteed) basis.

UID

User identification.

UNIX

A computer operating system developed by Bell Labs in the 1960s and 1970s.

UPnP

Universal Plug and Play. A Microsoft protocol designed to provide automatic network resource discovery.

UPS

Uninterruptible Power Supply.

USB

Universal Serial Bus.

US-CERT

United States CERT.

VA

Vulnerability assessment. Usually a process that discovers vulnerabilities in network endpoints.

VOIP

Voice over IP. A technology that uses IP protocols, software, and sometimes embedded systems that provides telephone-like services to users.

virus

A malicious piece of software that can replicate and execute itself. A virus uses other programs as carriers in the replication process.

VM

Vulnerability management. The process of ensuring that vulnerabilities are managed within the policies of the organization.

VPN

Virtual private network. A secure connection between two network endpoints.

wep

Wired Equivalent Privacy. A weak wireless security protocol that connects a wireless endpoint with an AP.

WiFi

A brand licensed by the Wi-Fi Alliance to describe wireless networks.

worm

A self-replicating malicious piece of code. Unlike a virus, a worm can copy itself to other endpoints.

WPA/WPA2

WiFi Protected Access. WPA is a framework designed to provide enhanced security to wireless devices.

WSUS

Windows Server Update Service.

XENIX

The predecessor to the Santa Cruz Operations version of UNIX, SCO UNIX.

zombie

A computer that hosts one or more bots.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset