Академический Документы
Профессиональный Документы
Культура Документы
a computer file. Each ACL contains a list of access control entries (ACE)
that specifies which users or system processes are granted access, denied
access or are audited for a securable object.
A black hat hacker is the “bad guy” who violates computer security for few
reasons beyond maliciousness or personal gain. Black Hat Hackers may
share information about the hack with other black hats so that the same
vulnerabilities can be exploited before the victim becomes aware and takes
appropriate measures.
A botnet is a remote network of zombie drones under the control of a black
hat. Attackers use various malware and viruses to take control of
computers to form a botnet (robotic network), which will send further
attacks such as spam and viruses to target computers or networks. Most
often, the users of the systems will not even know they are involved .
A bridge is an electronic device that connects two networks such as LAN
that uses the same protocol such as Ethernet or Token Ring, and creates
two distinct LAN's or Wide Area Networks. Operating at the Data Link
Layer of the Open System Interconnect model, bridges have the ability to
filter the information and can pass such information to the right nodes, or
decide not to pass any information. They also help in streamlining or
reducing the volume of traffic on a LAN by dividing the data into two
segments.
A brute force attack is the process of finding the solution by trying many
probable variants of information such as passwords, deciphered keys,
randomly.
A cold site is a backup site that can become operational fairly quickly,
usually in one or two days. A cold site might have standard office
equipment such as furniture and telephones, however there is unlikely to
be any computer equipment. Basically, a cold site is a backup facility ready
to receive computer equipment should a group need to move to an alternate
location.
Confidentiality ensures that rules are set that places restrictions on access
to, or sharing of information with the aim of preserving and protecting the
privacy of the information.
Data that is complete, intact, and trusted and has not been modified or
destroyed in an unauthorised or accidental manner.
Domain name system is the system by which internet domain names and
addresses are tracked and regulated.
The File Transfer Protocol (FTP) is a standard network protocol used for
the transfer of computer files from a server to a client on a computer
network. FTP is built on a client-server model architecture and uses
separate control and data connections between the client and the server.
A gray hat is a white hat/ black hat hybrid. A gray hat is a hacker with no
intention to do damage to a system or network, but to expose flaws in the
system security. However, they may use illegal means to gain access to the
net work to expose the security weakness.
HTTPS (also called HTTP over TLS, HTTP over SSL, and HTTP Secure)
is an Internet protocol used for secure communication over a computer
network. HTTPS is very important over insecure networks (such as public
WiFi), as anyone on the same local network can discover sensitive
information not protected by HTTPS. HTTPS consists of communication
over Hypertext Transfer Protocol (HTTP) within a connection encrypted
by Transport Layer Security or its predecessor, Secure Sockets Layer.
HTTP is the underlying protocol used by the World Wide Web (WWW).
This protocol defines how messages are formatted and transmitted on the
Internet and what actions web servers and browsers should take in
response to various commands.
The Internet Control Message Protocol (ICMP) is one of the key Internet
protocols and is used by network devices such as routers to generate error
messages to the source IP address when network problems prevent
delivery of IP packets. Any IP network device has the capability to send,
receive or process ICMP messages.
Intrusion
An unauthorised act of bypassing the security mechanisms of a network or
information system.
Intrusion Detection System is a security service that monitors and analyzes
network or system events for the purpose of finding, and providing
real-time or near real-time warning of, attempts to access system resources
in an unauthorized manner.
A network happens when two or more computer systems that are grouped
together share information, software and hardware.
OSI stands for Open System Interconnection and is an ISO standard for
worldwide communications. OSI defines a networking framework for
implementing protocols in seven layers. OSI defines seven layers of
functions that take place at each end of a communication. Although OSI is
not always strictly adhered to in terms of keeping related functions
together in a well-defined layer, many products involved in
telecommunication attempt to describe themselves in relation to the OSI
model.
OSI layer is a physical layers that conveys the bit stream, electrical impulse,
light, or radio signal through the network at the electrical and mechanical
level. Fast Ethernet, RS232, and ATM are protocols with physical layer
components.
Passive Attack
An assault perpetrated by an intentional threat source that attempts to learn
or make use of information from a system, but does not attempt to alter the
system, its resources, its data, or its operations.
Payload
In computing, a payload is the actual intended message within transmitted
data. In cybersecurity, however, a payload is the part of malware that
performs the malicious action.
A polymorphic virus is a virus that will change its digital footprint every
time it replicates. Anti virus software relies on a constantly updated and
evolving database of virus digital footprint signatures to detect any virus
that may have infected a system. By changing its signature upon
replication, a polymorphic virus may elude antivirus software, making it
very hard to eradicate.
Private Key
A cryptographic key that must be kept confidential and is used to enable
the operation of an asymmetric (public key) cryptographic algorithm.
Script Kiddie
An individual uses existing codes to hack into a system, lacking the
expertise to write their own. While they may not possess a lot of computing
talent, they're easily as dangerous as hackers.
A Secure Shell (SSH) is also known as Secure Socket Shell. SSH is a
UNIX-based command interface and protocol used to log into another
computer over a network, to execute commands in a remote machine, and
to move files from one machine to another.
Security Policy is a set of rules and practices that specify how a system or
organization delivers security services to protect sensitive and critical
information. It defines the objectives and constraints for the security
program.
A subnet mask is used to determine the number of bits that are used for the
subnet and host portions of the address. It is used as a screen of numbers
used for routing traffic within a subnet. Once a packet has arrived at a
gateway or connection point with its unique network number, it can be
routed to its destination within the internal gateways using the subnet
number.
SCADA is a generic name for a computerized system that is capable of
gathering and processing data and applying operational controls over long
distances. The typical uses include power transmission and distribution
and pipeline systems.
A switch is also called switching hub, bridging hub, officially MAC bridge.
It is a computer networking device that connects devices together on a
computer network by using packet switching to receive, process and
forward data to the destination device.
White hats are ethical hackers who use. They use their knowledge and skill
to thwart the black hats and secure the integrity of computer systems or
networks. If a black hat decides to target you, it’s a great thing to have a
white hat around. But if you don’t, you can always call on one of ours at
Global Digital Forensics.