A criminal or malicious hacker.
Defense Advanced Research Projects Agency.
A form of attack that is encoded in innocuous-seeming data and is executed by a user or a process to implement an attack. A data-driven attack is a concern for firewalls, because it may get through the firewall in data form and launch an attack against a system behind the firewall.
An unclassified crypto-algorithm adopted by the National Bureau of Standards for public use.
A cryptographic algorithm for the protection of unclassified data, published in Federal Information Processing Standard (FIPS) 46. The DES, which was approved by the National Institute of Standards and Technology (NIST), is intended for public and government use.
The shared or interconnected system of computers, communications, data applications, security, people, training, and other support structures serving the DoDs local, national, and worldwide information needs. DII connects DoD mission support, C2, and intelligence computers through voice, telecommunications, imagery, video, and multimedia services. It provides information processing and services to subscribers over the Defense Information Systems Network and includes C2, tactical, intelligence, and commercial communications systems used to transmit DoD information (pending approval in JP 1-02).
A process that integrates and coordinates policies and procedures, operations, personnel, and technology to protect information and defend information systems. Defensive information operations are conducted through information assurance, physical security, operations security, counter-deception, counter-psychological operations, counter-intelligence, electronic protect, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access while denying adversaries the opportunity to exploit friendly information and information systems for their own purposes (pending approval in JP 1-02).
A program that repeatedly calls the same telephone number. This is benign and legitimate for access to a BBS but malicious when used as a denial of service attack.
Action(s) that prevent any part of an AIS from functioning in accordance with its intended purpose.
The act of exploiting a terminal that someone has absent-mindedly left logged on.
See Data Encryption Standard (DES).
Assuming the DNS name of another system by either corrupting the name service cache of a victim system or by compromising a domain name server for a valid domain.