A-B
Access Control Access Control List (ACL) Access Control Service Access Management Access Access Matrix Account Harvesting ACK Piggybacking Active Content Activity Monitors Address Resolution Protocol (ARP) Advanced Encryption Standard (AES) Algorithm Applet ARPANET Asymmetric Cryptography Asymmetric Warfare Auditing Authentication Authenticity Authorization Autonomous System Availability Backdoor Bandwidth Banner Basic Authentication Bastion Host BIND Biometrics Bit Block Cipher Blue Team Boot Record Infector Border Gateway Protocol (BGP) Botnet Bridge British Standard 7799 Broadcast Broadcast Address Browser Brute Force Buffer Overflow Business Continuity Plan (BCP) Business Impact Analysis (BIA) Byte |
C-D
Cache Cache Cramming Cache Poisoning Call Admission Control (CAC) Cell Certificate-Based Authentication CGI Chain of Custody Challenge-Handshake Authentication Protocol (CHAP) Checksum Cipher Ciphertext Circuit Switched Network Client Cloud Computing Cold/Warm/Hot Disaster Recovery Site Collision Competitive Intelligence Computer Emergency Response Team (CERT) Computer Network Confidentiality Configuration Management Cookie Corruption Cost Benefit Analysis Countermeasure Covert Channels Crimeware Cron Crossover Cable Cryptanalysis Cryptographic Algorithm or Hash Cut-Through Cyclic Redundancy Check (CRC) Daemon Data Aggregation Data Custodian Data Encryption Standard (DES) Data Mining Data Owner Data Warehousing Datagram Day Zero Decapsulation Decryption Defacement Defense In-Depth Demilitarized Zone (DMZ) Denial of Service Dictionary Attack Diffie-Hellman Digest Authentication Digital Certificate Digital Envelope Digital Signature Digital Signature Algorithm (DSA) Digital Signature Standard (DSS) Disassembly Disaster Recovery Plan (DRP) Discretionary Access Control (DAC) Disruption Distance Vector Distributed Scans Domain Domain Hijacking Domain Name Domain Name System (DNS) Due Care Due Diligence DumpSec Dumpster Diving Dynamic Link Library Dynamic Routing Protocol |
E-F
Eavesdropping Echo Reply Echo Request Egress Filtering Emanations Analysis Encapsulation Encryption Ephemeral Port Escrow Passwords Ethernet Event Exponential Backoff Algorithm Exposure Extended ACLs (Cisco) Extensible Authentication Protocol (EAP) Exterior Gateway Protocol (EGP) False Rejects Fast File System Fast Flux Fault Line Attacks File Transfer Protocol (FTP) Filter Filtering Router Finger Fingerprinting Firewall Flooding Forest Fork Bomb Form-Based Authentication Forward Lookup Forward Proxy Fragment Offset Fragment Overlap Attack Fragmentation Frames Full Duplex Fully-Qualified Domain Name Fuzzing |
G-H
Gateway gethostbyaddr gethostbyname GNU Gnutella Hardening Hash Function Hash Functions Header Hijack Attack Honey Client Honey pot Honeymonkey Hops Host Host-Based ID HTTP Proxy HTTPS Hub Hybrid Attack Hybrid Encryption Hyperlink Hypertext Markup Language (HTML) Hypertext Transfer Protocol (HTTP) |
I-K
Identity Incident Incident Handling Incremental Backups Inetd (xinetd) Inference Attack Information Warfare Ingress Filtering Input Validation Attacks Integrity Integrity Star Property Internet Internet Control Message Protocol (ICMP) Internet Engineering Task Force (IETF) Internet Message Access Protocol (IMAP) Internet Protocol (IP) Internet Protocol Security (IPsec) Internet Standard Interrupt Intranet Intrusion Detection IP Address IP Flood IP Forwarding IP Spoofing ISO Issue-Specific Policy ITU-T Jitter Jump Bag Kerberos Kernel |
L-M
Lattice Techniques Layer 2 Forwarding Protocol (L2F) Layer 2 Tunneling Protocol (L2TP) Least Privilege Legion Lightweight Directory Access Protocol (LDAP) Link State List Based Access Control Loadable Kernel Modules (LKM) Log Clipping Logic bombs Logic Gate Loopback Address MAC Address Malicious Code Malware Mandatory Access Control (MAC) Man-in-the-Middle Attack (MitM) Masquerade Attack md5 Measures of Effectiveness (MOE) Monoculture Morris Worm Multi-Cast Multi-Homed Multiplexing |
N-O
NAT Network Address Translation. It is used to share one or a small number of publicly routable IP addresses among a larger number of hosts. The hosts are assigned private IP addresses, which are then "translated" into one of the publicly routed IP addresses. Typically home or small business networks use NAT to share a single DLS or Cable modem IP address. However, in some cases NAT is used for servers as an additional layer of protection. National Institute of Standards and Technology (NIST) Natural Disaster Netmask Network Address Translation Network Mapping Network Taps Network-Based IDS Non-Printable Character Non-Repudiation Null Session Octet One-Way Encryption One-Way Function Open Shortest Path First (OSPF) OSI OSI layers Overload |
P-Q
Packet Packet Switched Network Partitions Password Authentication Protocol (PAP) Password Cracking Password Sniffing Patch Patching Payload Penetration Penetration Testing Permutation Personal Firewalls Pharming Phishing Ping of Death Ping Scan Ping Sweep Plaintext Point-to-Point Protocol (PPP) Point-to-Point Tunneling Protocol (PPTP) Poison Reverse Polyinstantiation Polymorphism Port Port Scan Possession Post Office Protocol, Version 3 (POP3) Practical Extraction and Reporting Language (Perl) Preamble Pretty Good Privacy (PGP)TM Private Addressing Program Infector Program Policy Promiscuous Mode Proprietary Information Protocol Protocol Stacks (OSI) Proxy Server Public Key Public Key Encryption Public Key Infrastructure (PKI) Public-Key Forward Secrecy (PFS) QAZ |
R-S
Race Condition Radiation Monitoring Ransomware Reconnaissance Reflexive ACLs (Cisco) Registry regression analysis Request for Comment (RFC) Resource Exhaustion Response Reverse Address Resolution Protocol (RARP) Reverse Engineering Reverse Lookup Reverse Proxy Risk Risk Assessment Risk Averse Rivest-Shamir-Adleman (RSA) Role Based Access Control Root Rootkit Router Routing Information Protocol (RIP) Routing Loop RPC Scans Rule Set Based Access Control (RSBAC) S/Key Safety Scavenging Secure Electronic Transactions (SET) Secure Shell (SSH) Secure Sockets Layer (SSL) Security Policy Segment Sensitive Information Separation of Duties Server Session Session Hijacking Session Key SHA1 Shadow Password Files Share Shell Signals Analysis Signature Simple Integrity Property Simple Network Management Protocol (SNMP) Simple Security Property Smartcard Smishing Smurf Sniffer Sniffing Social Engineering Socket Socket Pair SOCKS Software Source Port Spam Spanning Port Split Horizon Split Key Spoof SQL Injection Stack Mashing Standard ACLs (Cisco) Star Property State Machine Stateful Inspection Static Host Tables Static Routing Stealthing Steganalysis Steganography Stimulus Store-and-Forward Straight-Through Cable Stream Cipher Strong Star Property Sub Network Subnet Mask Switch Switched Network Symbolic Links Symmetric Cryptography Symmetric Key SYN Flood Synchronization Syslog System Security Officer (SSO) System-Specific Policy |
T-U
T1, T3 Tamper TCP Fingerprinting TCP Full Open Scan TCP Half Open Scan TCP Wrapper TCP/IP TCPDump TELNET Threat Threat Assessment Threat Model Threat Vector Time to Live Tiny Fragment Attack Token Ring Token-Based Access Control Token-Based Devices Topology Traceroute (tracert.exe) Transmission Control Protocol (TCP) Transport Layer Security (TLS) Triple DES Triple-Wrapped Trojan Horse Trunking Trust Trusted Ports Tunnel UDP Scan Unicast Uniform Resource Identifier (URI) Uniform Resource Locator (URL) Unix Unprotected Share User User Contingency Plan User Datagram Protocol (UDP) |
V-Z
Virtual Private Network (VPN) Virus Vishing (voice or VoIP phishing) Voice Firewall Voice Intrusion Prevention System (IPS) War Chalking War Dialer War Dialing War Driving Web of Trust Web Server WHOIS Windowing Windump Wired Equivalent Privacy (WEP) Wireless Application Protocol Wiretapping World Wide Web ("the Web", WWW, W3) Worm Zero Day Zero-day attack Zombies |
#
3-way handshake Machine A sends a packet with a SYN flag set to Machine B. B acknowledges A's SYN with a SYN/ACK. A acknowledges B's SYN/ACK with an ACK. |