All > Technology > Security
A person with special expertise in computer systems and software. A hacker who attempts to gain unauthorized access to computer systems is a “cracker.”
- Browse Related Terms: Buffer Overflow, Cracking (also Crackers), Hacker, IDS Host-Based, Keystroke Monitoring, Min-Entropy, Password Protected, Rootkit, scanning, script kiddie, Signature, Victim
Also listed in:
- All > Law > E-Discovery
- All > Technology > Programming > Perl
All > Technology > Security
An individual who breaches Web sites or secured communications systems to deliver political messages, including those related to foreign policy, or propaganda. It has been described by Naval Postgraduate School Professor Dorothy Denning as “the marriage of hacking and activism.”
- Browse Related Terms: environment, Hacktivist, Information System Owner, Information System Owner (or Program Manager), Remote Maintenance, System Development Life Cycle (SDLC)
All > Technology > Security > Biometrics
The number of non-corresponding digits in a string of binary digits; used to measure dissimilarity. Hamming distances are used in many Daugman iris recognition algorithms. See also difference score, similarity score.
- Browse Related Terms: Algorithm, Authentication, Automated Biometric Identification System (ABIS), Feature, Feature Extraction, Hamming Distance, IrisCode©, Modality, model, Multimodal Biometric System, Recognition, reference, Template
All > Technology > Security > Biometrics
A biometric modality that uses the physical structure of an individual�s hand for recognition purposes.
- Browse Related Terms: Behavioral Biometric Characteristic, Biological Biometric Characteristic, Biometrics, Face Recognition, Gait, Hand Geometry Recognition, Iris Recognition, Keystroke Dynamics, Palm Print Recognition, Signature Dynamics, Speaker Recognition
All > Technology > Security
A type of program used in DDoS attacks to control agents distributed throughout a network. Also refers to an incident handler, which refers to a person who performs incident response work.
- Browse Related Terms: agent, Backup, Boot Sector Virus, Computer Virus, Deleted File, Easter Egg, Exploit Code, File Infector Virus, handler, Macro Virus, malicious code, Mobile Code, Mobile Software Agent, Port Scanning, System Software, Trojan horse, Virus, Worm, Zombie
Also listed in:
- All > Technology > Programming > Perl
All > Technology > Security
A message authentication code that utilizes a keyed hash.
- Browse Related Terms: Authentication Code, Challenge-Response Protocol, File Integrity Checker, Hash-based Message Authentication Code (HMAC), IP address, Keyed-hash based message authentication code (HMAC), Message Authentication Code (MAC), Message Digest, nonce, Secure Hash Algorithm (SHA-1), SHA-1, Traffic Analysis, Virus Hoax
Also listed in:
All > Technology > Security
An Approved mathematical function that maps a string of arbitrary length (up to a pre-determined maximum size) to a fixed length string. It may be used to produce a checksum, called a hash value or message digest, for a potentially long string or message.
- Browse Related Terms: Authentication Tag, Block Cipher Algorithm, Cryptographic Hash Function, Error Detection Code, Guessing Entropy, Hash Function, security attribute, Security Tag, Valid Data Element
Also listed in:
- All > Law > E-Discovery
- All > Technology > Programming > Java
All > Technology > Security
The process of using a mathematical algorithm against data to produce a numeric value that is representative of that data.
- Browse Related Terms: Collision, cryptographic algorithm, Hashing, One-Way Hash Algorithm, Pseudorandom number generator (PRNG), Public Seed, Random Number Generator (RNG)
All > Technology > Security
An enclave boundary protection device that controls access between a local area network that an enterprise system has a requirement to protect, and an external network that is outside the control of the enterprise system, with a high degree of assurance.
- Browse Related Terms: Antivirus Software, Boundary Router, Cyber Crime, Cyber warfare, Cyberspace, Demilitarized Zone (DMZ), Dynamic Host Configuration Protocol (DHCP), event, firewall, High Assurance Guard (HAG), IDS Network-Based, Incident management, Malicious code (also malware), packet sniffer, Physically Isolated Network, Proxy, server, Sniffer, Social Engineering, Virtual Private Network (VPN), Wired Equivalent Privacy (WEP)
All > Technology > Security
An information system in which at least one security objective (i.e., confidentiality, integrity, or availability) is assigned a FIPS 199 potential impact value of high.
- Browse Related Terms: assurance, Baseline Security, Cybersecurity, High Impact System, Incident, Information Assurance, Information Security, IT Security Goal, IT Security Metrics, Low Impact System, Malware, Moderate Impact System, Naming Authority, Potential Impact, Safeguards, Security Category, Security Controls, Security Goals, Security Objective, Security Requirements, sensitivity, Trustworthy System
All > Technology > Security > Identity Theft
In our context, it is also known as a “spam trap”. We have thousands of domains which accept all email sent to them, with the express purpose of capturing as much email as possible. We publish email addresses on high-visibility websites, in order to get on the perpetrators’ email lists, so that they will send us their phishing messages, which we can then take down.
- Browse Related Terms: Honey Pot, Malware, Phishing, SMShing, Spear Phishing, Vishing
All > Technology > Security
A host that is designed to collect data on suspicious activity and has no authorized users other than its administrators.
- Browse Related Terms: Access Control Lists (ACLs), Account Management, User, Audit Trail, Authentication Mechanism, availability, Client (Application), Discretionary Access Control, Honeypot, Identity-Based Security Policy, Least Privilege, Mandatory Access Control, Privileged Accounts, remote access, rule-based security policy, Unauthorized Access, user
All > Technology > Security
A fully operational off-site data processing facility equipped with hardware and system software to be used in the event of a disaster.
- Browse Related Terms: access control, Audit Data, Audit Reduction Tools, cold site, Disaster Recovery Plan (DRP), Disruption, Executive Agency, hot site, National Security Emergency Preparedness Telecommunications Services, Security Policy
Also listed in: