A

 < Day Day Up > 



Abuse of privilege

Formal nomenclature for user action(s) not in accordance with organizational policy or law. Actions falling outside, or explicitly proscribed by, acceptable use policy.

Acceptable level of risk

A judicious and carefully considered assessment by the appropriate authority that a computing activity or network meets the minimum requirements of applicable security directives. The assessment should take into account the value of assets; threats and vulnerabilities; countermeasures; and operational requirements.

Acceptable use policy (AUP)

DoD nomenclature for documented standards and/or guidance on usage of information systems and networked assets.

Accountability

The principle that individuals using a facility or a computer system must be identifiable. With accountability, violations or attempted violations of system security can be traced to individuals who can then be held responsible.

Accuracy

DoD parlance for the notion that information has been maintained and transferred in such a way as to be inviolate (the information has been protected from being modified or otherwise corrupted either maliciously or accidentally). Accuracy protects against forgery or tampering. Typically invoked as a synonym for integrity.

Acme of skill

To subdue an adversary without killing him.

Active attack

A form of attack in which data is actually modified, corrupted, or destroyed.

Adapter

A device that serves as an interface between the system unit and a device attached to it, such as a SCSI Adapter. Often synonymous with expansion card or board. Can also refer to a special type of connector.

Advanced WWWCount Counter

Full-featured advanced counter that is highly customizable allowing you to change digit formats, colors, time, and adjustable data counts.

Ambient data

This is a forensic term that describes, in general terms, data stored in nontraditional computer storage areas and formats. The term was coined in 1996 to help students understand computer-evidence-processing techniques that deal with evidence not stored in standard computer files, formats, and storage areas. The term is now widely used in the computer forensics community and it generally describes data stored in the Windows swap file, unallocated space, and file slack.

Anomaly detection

A label for the class of intrusion-detection tactics that seek to identify potential intrusion attempts by virtue of their being (presumably) sufficiently deviant (anomalous) in comparison with expected or authorized activities. Phrased another way, anomaly detection begins with a positive model of expected system operations and flags potential intrusions on the basis of their deviation (as particular events or actions) from this presumed norm.

Anonymous FTP

Allows visitors to upload and/or download predetermined files from designated directories without usernames or passwords. For example, distribute your latest software package by allowing visitors to download it through anonymous FTP. This is different than a regular FTP account

Antivirus

Software that detects, repairs, cleans, or removes virus-infected files from a computer.

Application

A more technical term for program.

Application gateway

One form of a firewall in which valid application-level data must be checked or confirmed before allowing a connection. In the case of an ftp connection, the application gateway appears as a ftp server to the client and a ftp client to the server.

ASIM (Automated Security Incident Measurement)

Current DoD automated security tool that monitors network traffic, collects information on targeted unit networks, and detects unauthorized network activity.

Assurance

A measure of confidence that the security features and architecture of an information system or network accurately reflect and enforce the given security policy.

Asynchronous attacks

Attacks that take advantage of dynamic system actions—especially by exploiting an ability to manipulate the timing of those actions.

Attack

With specific regard to IW—a specific formulation or execution of a plan to carry out a threat. An attempt to bypass security controls on a computer. An active attack alters data. A passive attack releases data. Whether an attack will succeed depends on the vulnerability of the computer system and the effectiveness of existing countermeasures.

Attitudes

Positively or negatively learned orientations toward something or someone that have a tendency to motivate an individual or group toward some behavior. Experienced soldiers, for example, have negative attitudes toward slovenliness.

Audit trail

In computer security systems, a chronological record of when users log-in, how long they are engaged in various activities, what they were doing, and whether any actual or attempted security violations occurred. An automated or manual set of chronological records of system activities that may enable the reconstruction and examination of a sequence of events and/or changes in an event.

AUP

Acronym for acceptable use policy.

Autoresponders

Sends an automated e-mail response to incoming mail sent to a specific address. For instance, you can have your visitors send an e-mail to ‘info@yourdomain.com’ to get an e-mail explaining your latest product, or automatically reply to orders with a prewritten ‘thank you’ e-mail message.



 < Day Day Up > 



Computer Forensics. Computer Crime Scene Investigation
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
ISBN: 1584500182
EAN: 2147483647
Year: 2002
Pages: 263
Authors: John R. Vacca

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net