DOCUMENT
SANS Glossary of Terms
445 definitions by SANS Institute

Access ControlAccess Control List (ACL)Access Control ServiceAccess Management AccessAccess MatrixAccount HarvestingACK PiggybackingActive ContentActivity MonitorsAddress Resolution ProtocolAdvanced Encryption StandardAdvanced Research Projects Agency NetworkAlgorithmAppletAsymmetric CryptographyAsymmetric WelfareAuditingAuthenticationAuthenticityAuthorizationAutonomous SystemAvailibilityBackdoorBandwidthBannerBasic AuthenticationBastion HostBerkeley Internet Name DomainBiometricsBitBlock CipherBoot Record InfectorBorder Gateway ProtocolBotnetBridgeBritish Standard 7799BroadcastBroadcast AddressBrowserBrute ForceBuffer OverflowBusiness Continuity PlanBusiness Impact AnalysisByteCacheCache CrammingCache PoisoningCall Admission ControlCellCertificate-Based AuthenticationChain of CustodyChallenge-Handshake Authentication ProtocolChecksumCipherCiphertextCircuit Switched NetworkClientCold/Warm/Hot Disaster Recovery SiteCollisionCommon Gateway InterfaceCompetitive IntelligenceComputer Emergency Response TeamComputer NetworkConfidentialityConfiguration ManagementCookieCorruptionCost Benefit AnalysisCountermeasureCover ChannelsCronCrossover CableCryptanalysisCryptographic AlgorithmCut-ThroughCyclic Redundancy CheckDaemonData AggregationData CustodianData Encryption StandardDatagramData MiningData OwnerData WarehousingDay ZeroDecapsulationDecryptionDefacementDefense In-DepthDemilitarized ZoneDenial of ServiceDictionary AttackDiffie-HellmanDigest AuthenticationDigital CertificateDigital EnvelopeDigital SignatureDigital Signature AlgorithmDigital Signature StandardDisassemblyDisaster Recovery PlanDiscretionary Access ControlDisruptionDistance VectorsDistributed ScansDomainDomain HijackingDomain NameDomain Name SystemDue CareDue DiligenceDumpSecDumpster DivingDynamic Link LibraryDynamic Routing ProtocolEavesdroppingEcho ReplyEcho RequestEgress FilteringEmanations AnalysisEncapsulationEncryptionEphemeral PortEscrow PasswordsEthernetEventExponential Backoff AlgorithmExposureExtended ACLsExtensible Authentication Protocol (EAP)Exterior Gateway ProtocolFalse RejectsFast File SystemFast FluxFault Line AttacksFile Transfer ProtocolFilterFiltering RouterFingerFingerprintingFirewallFloodingForestFork BombForm-Based AuthenticationForward LookupForward ProxyFragmentationFragment OffsetFragment Overlap AttackFramesFull DuplexFully-Qualified Domain NameFuzzingGatewayGethostbyaddrGethostbynameGNUGnutellaHardeningHash FunctionHash FunctionsHeaderHijack AttackHoneymonkeyHoney PotHopsHostHost-Based IDHTTP ProxyHTTPSHubHybrid AttackHybrid EncryptionHyperlinkHypertext Markup LanguageHypertext Transfer ProtocolIdentityIncidentIncident HandlingIncremental BackupsInetdInference AttacksInformation WarfareIngress FilteringInput Validation AttacksIntegrityIntegrity Star PropertyInternetInternet Control Message ProtocolInternet Engineering Task ForceInternet Message Access ProtocolInternet ProtocolInternet Protocol SecurityInternet StandardInterruptIntranetIntrusion DetectionIP AddressIP FloodIP ForwardingIP SpoofingISOIssue-Specific PolicyITU-TJitterJump BagKerberosKernelLattice TechniquesLayer 2 Forwarding ProtocolLayer 2 Tunneling ProtocolLeast PrivilegeLegionLightweight Directory Access ProtocolLink StateList Based Access ControlLoadable Kernel ModulesLog ClippingLogic BombsLogic GateLoopback AddressMAC AddressMalicious CodeMalwareMandatory Access ControlMasquerade Attackmd5Measures of EffectivenessMonocultureMorris WormMulti-CastMulti-HomedMultiplexingNational Institute of Standards and TechnologyNatural DisasterNetmaskNetwork Address TranslationNetwork Address TranslationNetwork-Based IDSNetwork MappingNetwork TapsNon-Printable CharacterNon-RepudiationNull SessionOctetOne-Way EncryptionOne-Way FunctionOpen Shortest Path FirstOpen Systems InterconnectionOSI LayersOverloadPacketPacket Switched NetworkPartitionsPassword Authentication ProtocolPassword CrackingPassword SniffingPatchPatchingPayloadPenetrationPenetration TestingPermutationPersonal FirewallsPharmingPhishingPing of DeathPing ScanPing SweepPlaintextPoint-to-Point ProtocolPoint-to-Point Tunneling ProtocolPoison ReversePolyinstantiationPolymorphismPortPort ScanPossessionPost Office Protocol, Version 3Practical Extraction and Reporting LanguagePreamblePretty Good Privacy (PGP) TMPrivate AddressingProgram InfectorProgram PolicyPromiscuous ModeProprietary InformationProtocolProtocol Stacks (OSI)Proxy ServerPublic KeyPublic Key EncryptionPublic-Key Forward Secrecy (PFS)Public Key InfrastructureQAZRace ConditionRadiation MonitoringReconnaissanceReflexive ACLs (Cisco)RegistryRegression AnalysisRequest for CommentResource ExhaustionResponseReverse Address Resolution ProtocolReverse EngineeringReverse LookupReverse ProxyRiskRisk AssessmentRisk AverseRivest-Shamir-AdlemanRole Based Access ControlRootRootkitRouterRouting Information ProtocolRouting LoopRPC ScansRule Set Based Access ControlSafetyScavengingSecure Electronic TransactionSecure ShellSecure Sockets LayerSecurity PolicySegmentSensitive InformationSeparation of DutiesServerSessionSession HijackingSession KeySHA1Shadow Password FilesShareShellSignals AnalysisSignatureSimple Integrity PropertySimple Network Management ProtocolSimple Security PropertyS/KeySmartcardSmurfSnifferSniffingSocial EngineeringSocketSocket PairSOCKSSoftwareSource PortSpamSpanning PortSplit HorizonSplit KeySpoofSQL InjectionStack MashingStandard ACLsStar PropertyStateful InspectionState MachineStatic Host TablesStatic RoutingStealthingSteganalysisSteganographyStimulusStore-and-ForwardStraight-Through CableStream CipherStrong Star PropertySubnet MaskSub NetworkSwitchSwitched NetworkSymbolic LinksSymmetric CryptographySymmetric KeySynchronizationSYN FloodSyslogSystem Security OfficerSystem-Specific PolicyT1, T3TamperTCPDumpTCP FingerprintingTCP Full Open ScanTCP Half Open ScanTCP/IPTCP WrapperTELNETThreatThreat AssessmentThreat ModelThreat VectorTime to LiveTiny Fragment AttackToken-Based Access ControlToken-Based DevicesToken RingTopologyTracerouteTransmission Control ProtocolTransport Layer SecurityTriple DESTriple-WrappedTrojan HorseTrunkingTrustTrusted PortsTunnelUDP ScanUnicastUniform Resource IdentifierUniform Resource LocatorUnixUnprotected ShareUserUser Contingency PlanUser Datagram ProtocolVirtual Private NetworkVirusVoice FirewallVoice Intrusion Prevention SystemWar ChalkingWar DialerWar DialingWar DrivingWeb of TrustWeb ServerWHOISWindowingWindumpWired Equivalent PrivacyWireless Application ProtocolWiretappingWorld Wide WebWormZero-Day AttackZombies
Loading conversations.
Date
2014-04-13
Related Entities