A UDP-based access control protocol that provides authentication, authorization, and accounting.
A security model that specifies the rights that a subject can transfer to or from another subject or object.
The total combination of protection mechanisms within a computer system, including hardware, firmware, and software, which is responsible for enforcing a security policy.
A connection-oriented network protocol that provides reliable delivery of packets over a network.
Commonly known as the Orange Book. Formal systems evaluation criteria developed for the U.S. Department of Defense by the National Computer Security Center (NCSC) as part of the Rainbow Series.
A type of stack overflow attack that exploits vulnerabilities in the IP protocol.
Hardware and software technology used to implement access control.
A network protocol used to establish a command line interface on another system over a network. See also SSH.
Any natural or man-made circumstance or event that could have an adverse or undesirable impact, whether minor or major, on an organizational asset.
Commonly known as the Red Book (of the Rainbow Series; see also TCSEC). Addresses confidentiality and integrity in trusted computer/ communications network systems.
A hardware device used in two-factor authentication.
A star-topology network transport protocol.
As defined by the U.S. Patent and Trademark Office (PTO), a trademark is “any word, name, symbol, or device, or any combination, used, or intended to be used, in commerce to identify and distinguish the goods of one manufacturer or seller from goods manufactured or sold by others.”
Proprietary or business-related information which a company or individual uses and has exclusive rights to.
A method of attack whereby an attacker observes network traffic patterns in order to make deductions about network utilization, architecture, behavior, or other discernable characteristic.
A momentary electrical line noise disturbance.
Ciphers that rearrange bits, characters, or character blocks in plaintext to produce ciphertext.
A feature within a program that performs an undocumented function, usually a security bypass such as an elevation of privilege.
A program that purports to perform a given function, but which actually performs some other, and usually malicious, function.
A system that employs all necessary hardware and software assurance measures and meets the specified requirements for reliability and security.
The Rainbow Series document that addresses confidentiality and integrity in trusted computer/communications network systems. See also TCSEC.
A direct communications path between the user and the TCB that does not require interaction with untrusted applications or operating system layers.
Safeguards to prevent the disclosure of information during the recovery of a system after a failure.
An authentication method that requires two ways of establishing identity.