E-F

 < Day Day Up > 



Economic info-warfare/economic information warfare

The application of IW tactics to leverage one’s interests in the economic realm. A subclassification of IW.

Economic warfare

Aggressive use of economic means to achieve national objectives.

EIDE

Stands for enhanced integrated drive electronics. A specific type of attachment interface specification that allows for high-performance, large-capacity drives. See also IDE.

Electromagnetic intrusion

The intentional insertion of electromagnetic energy into transmission paths in any manner, with the objective of deceiving operators or causing confusion.

Electronic warfare

Any military action involving the use of electromagnetic and directed energy to control the electromagnetic spectrum or attack the enemy. Also called EW.

Electronics intelligence (ELINT)

Technical and geolocation intelligence derived from foreign noncommunications, electromagnetic radiations emanating from sources other than nuclear detonations or radioactive sources.

Electronics security

The protection resulting from all measures designed to deny unauthorized persons information of value that might be derived from their interception and study of noncommunications electromagnetic radiations (radar). This term is also (more loosely) used to connote the topical area or task specialization focusing on achieving this type of protection.

Electro-optical intelligence (ELECTRO-OPTINT)

Intelligence other than signals intelligence derived from the optical monitoring of the electromagnetic spectrum from ultraviolet (0.01 micrometers) through far infrared (1,000 micrometers).

ELINT

Acronym for electronics intelligence.

E-mail accounts (POP3)

These are your e-mail boxes on a server that can be accessed directly to retrieve your mail using such programs as Outlook Express and Netscape Mail. Each POP3 has its own password to ensure privacy, so each of your employees could have their own e-mail address.

E-mail aliases

Your main POP account for your domain allows the system to capture any name that may be sent to your domain name. This means as long as the @yourdomain.com is proper, any name in front of it will be delivered to your main POP account. Each alias can be forwarded or redirected to any other address of your choice.

E-mail forwarding

Any e-mail address at your domain may be configured to forward to any other real internet e-mail address. For example, sales@yourname.com can forward to you@aol.com if you like.

E-mail mini mailing lists

Use it to send your customers news and updates about your product or services without e-mailing each one separately. Visitors can add themselves to your list or take themselves off automatically. You send one e-mail and it goes to every e-mail address on the list. The system is capable of multiple lists, each of which can handle up to 1,000 e-mail addresses and outgoing messages up to 75K each.

Entrapment

The deliberate planting of apparent flaws in a system for the purpose of detecting attempted penetrations.

essential elements of friendly information

Key questions likely to be asked by adversary officials and intelligence systems about specific friendly intentions, capabilities, and activities, so they can obtain answers critical to their operational effectiveness.

Executable

A binary file containing a program in machine language that is ready to be executed (run). MS-DOS and Windows machines use the filename extension “.exe” for these files.

Extract

To extract is to return a compressed file to its original state. Typically, to view the contents of a compressed file, you must extract it first.

Expansion card

An integrated circuit card that plugs into an expansion slot on a motherboard to provide access to additional peripherals or features not built into the motherboard. See also adapter.

FDISK

The disk-partitioning program used in DOS and several other operating systems to create the master boot record and allocate partitions for the operating system’s use.

File

A collection of data grouped into one unit on a disk.

File allocation table

(FAT or FAT32) DOS uses the FAT to manage the disk data area. The FAT tells DOS which portions of the disk belong to each file. The FAT links together all of the clusters belonging to each file, no matter where they are on disk. The FAT is a critical file: You should be sure to back it up regularly. FAT32 is a newer type of FAT, which was designed to handle large hard disks. The older FAT (FAT16) can only support partitions up to two gigabytes in size. FAT32 can handle partitions that are thousands of gigabytes.

File slack

File slack potentially contains randomly selected bytes of data from computer memory. This happens because DOS/Windows normally writes in 512 byte blocks called “sectors.” Clusters are made up of blocks of sectors. If there is not enough data in the file to fill the last sector in a file, DOS/Windows makes up the difference by padding the remaining space with data from the memory buffers of the operating system. This randomly selected data from memory is called “RAM Slack” because it comes from the memory of the computer. RAM Slack can contain any information that may have been created, viewed, modified, downloaded, or copied during work sessions that have occurred since the computer was last booted. Thus, if the computer has not been shut down for several days, the data stored in file slack can come from work sessions that occurred in the past.

File system

A system for organizing directories and files, generally in terms of how it is implemented in the disk-operating system.

Firewall

A metaphorical label for a set of hardware and software components protecting system resources (servers, LANs) from exogenous attack via a network (from Internet users) by intercepting and checking network traffic. The “mix” of hardware and software accomplishing firewall operations can vary. For LAN installations of any size, the typical approach is to install one or more computers “positioned” at critical junctures (gateways) and dedicated to the firewall functions. It is typically the case that such installations are configured such that all external connections (modems, ports) are “outside” the firewall (with respect to its domain of protection), or at least “abut” it on its “external face.” The firewall’s own “internal” connection into the protected domain is typically the focus of monitoring functions. A system or combination of systems that enforces a boundary between two or more networks. Gateway that limits access between networks in accordance with local security policy. The typical firewall is an inexpensive micro-based Unix box kept clean of critical data, with a bunch of modems and public network ports on it but just one carefully watched connection back to the rest of the cluster.

Firewall machine

A specific computer dedicated to effecting a firewall.

Firmware

Software contained in a read-only memory (ROM) device.

First-wave war(fare)

The term for the mode or character of war(fare) exemplified in primitive, pastoral, and agricultural societies and dating from prehistory.

Fishbowl

A defensive IW tactic in which a suspicious or unauthorized user is permitted to continue established access to the protected system or network, but whose interactions with that system or network are (all unknown and unapparent to the subject) “encapsulated” within a secure domain of operations (rerouted to an isolated computer; redirected to a dummy environment simulating an actual server) so that IW defenders can observe and analyze the user’s intentions, tactics, and/or identity. To contain, isolate, and monitor an unauthorized user within a system in order to gain information about the user.

Fog of war

The aggregate of factors that reduce or preclude situational certainty in a battlespace.

Fork bomb

A disruptive piece of code directed toward a Unix-based system that causes runaway “forking” (splitting or replication) of operating system processes to degrade or (if saturation is achieved) deny that target system’s operations. Code that can be written in one line of code on any Unix system; used to recursively spawn copies of itself, explode, and eventually eat all the process table entries and effectively locks up the system.

Folder

Commonly used as a standard Windows 95/98/NT term, equivalent to the Windows 3.x term directory.

FORMAT

The DOS format program that performs high-level formatting on a hard disk, and both high- and low-level formatting on a floppy disk.

Formmail

Use Formmail to e-mail the contents of forms on your Web pages to you when a visitor fills it out.

Fragmentation

The state of having a file scattered around a disk in pieces rather than existing in one contiguous area of the disk. Fragmented files are slower to read than unfragmented files.

Free for all links page

Allows visitors to add links to any Web site onto the list, categorized by subject.

Friction (of war)

The aggregate of factors and events that reduce or degrade operational efficiency (and, hence, effectiveness) in the “real world” of war-making. The label is a metaphorical allusion to the sort of “heat loss” that is an inescapable part of physical–mechanical systems.

FrontPage extensions

FrontPage is Microsoft’s simple Web-page editor designed for nonprogrammers. It includes many of its own scripts and special effects, but to use them, you have to install the FrontPage “extensions” on your Web site. You should either plan to use CGI-based applications or FrontPage. FrontPage does not provide the ability to edit or maintain files in your home directory and does not upload in true ascii.

FTP Account

Used to upload and download files to and from your Web site. You have unlimited access to your account 24 hours a day. You’ll need to have FTP client software.



 < Day Day Up > 



Computer Forensics. Computer Crime Scene Investigation
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
ISBN: 1584500182
EAN: 2147483647
Year: 2002
Pages: 263
Authors: John R. Vacca

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net