Term
|
Definition
Preventing external threats from getting around our protection mechanisms. |
|
|
Term
Breach of Confidentiality |
|
Definition
Unauthorized reading of data or theft of information. |
|
|
Term
|
Definition
Unauthorized modification of data. |
|
|
Term
|
Definition
Unauthorized destruction of data. |
|
|
Term
|
Definition
Unauthorized use of resources. |
|
|
Term
|
Definition
Prevents legitimate use of the system. |
|
|
Term
|
Definition
One participant in a communication pretends to be someone else. |
|
|
Term
|
Definition
The correctness of identification. |
|
|
Term
|
Definition
Malicious or fraudulent repeat of a valid data transmissions. |
|
|
Term
|
Definition
Commonly used alongside a replay attack where the attacker changes the message in order to escalate privileges. |
|
|
Term
|
Definition
An attacker gets between two communicating computers and pretends to be the server to the sender and the sender to the server in order to steal data or alter information. |
|
|
Term
|
Definition
A breach where an active communication session is intercepted. |
|
|
Term
|
Definition
A code segment that misuses its environment. Basically anything that pretends to be something it's not. |
|
|
Term
|
Definition
Leaving a hole in security that only a user with knowledge of the hole would be able to use. An example would be the movie office space. |
|
|
Term
|
Definition
Creating a hole in security when only certain conditions are met. |
|
|
Term
|
Definition
Exploitation of a bug in a program to allow the attackers code to be run. |
|
|
Term
|
Definition
Self-Replicating and infect other programs. |
|
|
Term
|
Definition
Process that uses the spawn mechanism to make copies of itself and use of system resources. |
|
|
Term
|
Definition
A means for a cracker to detect a system's vulnerabilities to attack. Port Scanning typically is automated, involving a tool that attempts to create a TCP/IP connection to a specified port of range of ports. |
|
|
Term
|
Definition
A previously compromised, independent system that are used both by their owners and attackers. |
|
|
Term
Distributed Denial of Service Attack |
|
Definition
Having many compromised or willing systems all launch a DOS attack against a target with the hope of overwhelming it. |
|
|
Term
|
Definition
Ensures that only a computer possessing the correct key can read a message. |
|
|
Term
|
Definition
A way for a computer to decrypt an encrypted message. |
|
|
Term
|
Definition
The same key is used to encrypt and decrypt. Systems must agree on a key ahead of time. |
|
|
Term
|
Definition
Encrypting a chunk of bits at a time. |
|
|
Term
|
Definition
XORing the encrypted chunk with the previous chunk before encryption. |
|
|
Term
|
Definition
Encrypts and decrypts a stream a bits or bytes rather than a block. |
|
|
Term
|
Definition
The key used to encrypt is different than the key used to decrypt. Often used with public keys and private keys. |
|
|
Term
|
Definition
A key that is never shared. |
|
|
Term
|
Definition
A key that everyone has access to. |
|
|
Term
|
Definition
A function that creates a small, fixed-sized block of data from a message. |
|
|
Term
|
Definition
The small, fixed-sized block of data made by a hash function. |
|
|
Term
|
Definition
A way of ensuring a message is from a particular computer. |
|
|
Term
|
Definition
A string that supposedly identifies a particular user. Check authenticity by comparing the password the user gives to the one stored in the system. |
|
|
Term
|
Definition
The password changes in each session. |
|
|