Cyb220 Glossary
Cyb220 Glossary
Adversarial Thinking
Anomaly Detection
Artificial Intelligence
Attack Vector
The comparison of two different log files to try and determine outliers and
anomalies. Usually done with some type of software analysis tool (PC
Magazine, 2018).
Data Logging
The continuous recording of data. The term may refer to the automatic
collection of data from sensors in the field, or in a factory or scientific
environment. It may also refer to gathering traffic statistics in a network or
events in the computer (PC Magazine, 2018).
Analyzing network traffic to discover the type of application that sent the data.
In order to prioritize traffic or filter out unwanted data, deep packet inspection
can differentiate data such as video, audio, chat, voice over IP (VoIP), email,
and web. As it inspects the packets all the way up to layer seven, deep packet
inspection can be used to analyze anything and everything within the packet
that is not encrypted. For example, it can determine not only that the packets
contain the contents of a webpage, but also which website the page is from
(PC Magazine, 2018).
Defense in Depth
Device Reconfiguration
Exposure
Establishing Profiles
Files Systems
The software that people use to copy, move, rename, and delete files is
known as a file manager, not a file system.
The software and method for storing and retrieving files on a disk, SSD, or
USB drive. The file system takes commands from the operating system to
read and write the disk clusters (groups of sectors). It manages the
folder/directory structure and provides an index to the files. It also defines the
syntax used to access them (i.e., how the “path” to the file is coded). File
systems dictate how files are named, the maximum size of a file, and the
volume of storage (PC Magazine, 2018).
Filtering
To select data, filters use patterns (masks) against which all data are
compared. Only matching data are “passed through,” hence the concept of a
filter. For example, email clients and servers can look for messages with text
patterns that are recognized as spam and then delete them. An email client
can be set up to filter messages and store them in separate mailboxes as a
way of organizing the mail, or it can be set to alert the user when a certain
type of message arrives (PC Magazine, 2018).
Filtering Algorithms
A process that allows traffic through based on some set of rules. The rules are
enforced to keep unauthorized information from passing through the network
defense.
Firewall
The primary method for keeping a computer secure from intruders. A firewall
allows or blocks traffic into and out of a private network or the user’s
computer. Firewalls are widely used to give users secure access to the
internet and to separate a company’s public web server from its internal
network. They are also used to keep internal network segments secure; for
example, the accounting network might be vulnerable to snooping from within
the enterprise (PC Magazine, 2018).
Abstraction
Complete Mediation
Encapsulation
Information Hiding
Users having an interface to interact with the system behind the scenes.
The user should not be worried about the nuts and bolts behind the
scenes, only the modes of access presented to them. This topic is also
integrated with object-oriented programming (Tjaden, 2015).
Isolation
Layering
Least Privilege
The assurance that an entity only has the minimal amount of privileges
to perform its duties. There is no extension of privileges to senior people
just because they are senior; if they don’t need the permissions to
perform their normal everyday tasks, then they don’t receive higher
privileges (Tjaden, 2015).
Modularity
Breaking down large tasks into smaller, more manageable tasks. This
smaller task may be reused, and therefore the process can be
repurposed time and time again (Tjaden, 2015).
Open Design
Trust Relationships
Usability
Fuzzy Logic
A mathematical technique for dealing with imprecise data and problems that
have many solutions rather than one. Although it is implemented in digital
computers, which ultimately make only yes-no decisions, fuzzy logic works
with ranges of values, solving problems in a way that more resembles human
logic.
Fuzzy logic is used for solving problems with expert systems and real-time
systems that must react to an imperfect environment of highly variable,
volatile, or unpredictable conditions. It “smoothes the edges,” so to speak,
circumventing abrupt changes in operation that could result from relying on
traditional either-or and all-or-nothing logic (PC Magazine, 2018).
Hierarchical IDSs
Honeynets
Honeypot
Hypervisor
Log Aggregation
Log management is the process of handling copious volumes of logs that are
made up of several processes, such as log collection, log aggregation,
storage, rotation, analysis, search, and reporting.
The analysis of information generated by the computer systems. The files can
be analyzed for anomalies or other patterns that are set by the alert levels of
the organization.
Memory
A variety of methods used to store and keep track of data and programs in
memory and reclaim the space when no longer needed. Virtual memory is the
most common memory management function in every computer (PC
Magazine, 2018).
Multithreading
A feature within a CPU that allows two or more instruction streams (threads)
to execute concurrently. Each stream is a subprocess that is managed by the
CPU and operating system. Today’s CPUs support a large number of threads.
For example, IBM’s POWER8 CPU comes with up to 12 cores, and each core
handles eight threads for a total of 96 threads.
The technology that maintains the privacy of the addresses of the computers
in a home or business network when accessing the internet. NAT converts the
private addresses that are assigned to the internal computers to one or more
public addresses that are visible on the internet. It is an IETF standard that is
implemented in a router or firewall as well as in any user’s machine that is
configured to share its internet connection.
NAT assigns a number to the packet headers of the messages going out to
the internet and keeps track of them via an internal table that it creates. When
responses come back from the internet, NAT uses the table to perform the
reverse conversion to the private IP address of the requesting client machine
(PC Magazine, 2018).
Network Analyzer
In order to alert admins about traffic problems, packets are analyzed in real
time. Hardware network analyzers can detect voltage and cable problems,
whereas software analyzers cannot (PC Magazine, 2018).
Network Attacks
Making a user’s computer more secure. It ensures that the latest patches to
operating systems, web browsers, and other vulnerable applications are
automatically applied. It may also include the disabling of file sharing and the
establishing of login passwords (PC Magazine, 2018).
Neural Network
Opening Application
The initial program that is instantiated when an intrusion is detected. Often
used as a first line of defense to start mitigation strategies.
Policy Management
Enforcing the policy (i.e., rules and regulations) of the organization that pertain
to information and computing. Also called “policy-based management,” policy
management mostly deals with database access and network resource
issues, such as which users have access to what data and how network traffic
is prioritized (PC Magazine, 2018).
The rights granted to a single user or group of users who operate a computer.
Administrative privileges allow a user the right to make any and all changes in
the computer, including setting up accounts for other users. User-level
privileges are more restricted.
Process
Proxy Server
The word proxy means “to act on behalf of another,” and a proxy server acts
on behalf of the user. All requests from clients to the internet go to the proxy
server first. The proxy evaluates the request, and if allowed, reestablishes it
on the outbound side to the internet. Likewise, responses from the internet go
to the proxy server to be evaluated. The proxy then relays the message to the
client. Both client and server think they are communicating with one another,
but, in fact, they are dealing only with the proxy (PC Magazine, 2018).
Reach Back
The amount of time that can be assessed to look back at events that
influenced behaviors. This methodology is used to determine the history of
events that led up to an intrusion.
Session Interruption
Stopping the current process where irregularities have been detected. This is
a form of intrusion detection that stops rogue processes from getting out of
control.
Signature Detection
SNMP Trap
Using the network management protocol to trap data on the network. This can
be used to isolate bad traffic so it can be handled.
Specification-Based Detection
Statistical Techniques
Stealth Mode
Taking place in secret. Stealth mode often refers to the policy of startups,
when companies are developing unique products, or the policy of established
companies when they are creating something new. Everyone is sworn to
secrecy, and a low profile is kept until launch time (PC Magazine, 2018).
Thread
Trace Recording
Virtualization
Virtual Memory
Simulating more random access memory (RAM) than actually exists, allowing
the computer to run larger programs and multiple programs concurrently. A
common function in most every OS and hardware platform, virtual memory
uses storage (hard drive or solid-state drive) to temporarily hold what was in
RAM.
Virtual memory allows multiple programs to load in RAM at the same time.
Each application addresses RAM starting at zero, but virtual memory takes
control of the RAM addressing and lets each application function as if it had
unlimited RAM (PC Magazine, 2018).
In the past, common carriers used their vast networks to “tunnel” traffic
between customer locations to give the appearance of a private network while
sharing backbone trunks, no different than the way the internet works. Prior to
the internet’s IP protocol, VPNs were built over X.25, Switched 56, frame
relay, and ATM technologies (PC Magazine, 2018).
The use of alarms or warning systems to make individuals aware that the
system has been compromised.
References
Bishop, M. (2003). Computer security: Art and science (1st ed.). Boston, MA:
Addison-Wesley Professional.
Hamman, S. T., Hopkinson, K. M., Markham, R. L., Chaplik, A. M., & Metzler, G. E.
(2017). Teaching game theory to improve adversarial thinking in cybersecurity
students. IEEE Transactions on Education, 60(3), 205-211.