T-V

 < Day Day Up > 



Tactical internet

A battlefield communication system networked together using commercially based internet protocols.

TECHINT

Acronym for technical intelligence.

Technical attack

An attack that can be perpetrated by circumventing or nullifying hardware and software protection mechanisms, rather than by subverting system personnel or other users.

Technical intelligence (TECHINT)

Intelligence derived from exploitation of foreign materiel, produced for strategic, operational, and tactical level commanders. Technical intelligence begins when an individual service member finds something new on the battlefield and takes the proper steps to report it. The item is then exploited at succeedingly higher levels until a countermeasure is produced to neutralize the adversary’s technological advantage. (DOD Dictionary of Military Terms)

Telnet account

Telnet allows real-time access to the command line of your server (similar to the C:\ prompt in DOS) to run programs and install and configure scripts. Most cgi scripts can be installed without Telnet unless you need it for debugging purposes.

Terminal hijacking

Allows an attacker on a certain machine to control any terminal session that is in progress. A attack hacker can send and receive terminal I/O while a user is on the terminal.

Terminator

Most commonly found in relation to a SCSI chain, this functions to prevent the reflection or echoing of signals that reach the ends of the SCSI bus. Usually terminators are hardware circuits or jumpers.

Third-wave war(fare)

A synonym for IW or knowledge war The allusion is to Toffler’s “Third Wave” of economic activity, which concentrates on information and knowledge as raw material and product. This three-tiered economic or political model was a major influence on the DOD thinkers whose work led to today’s interest in IW.

Time bomb

A logic bomb that is specifically triggered by a temporal event (a predetermined date/time). A logic bomb that is triggered by reaching some preset time, either once or periodically. A variant of the Trojan horse in which malicious code is inserted to be triggered later.

TRANSEC

Acronym for transmission security (communications security).

Trap door

A hidden software or hardware mechanism used to circumvent security control.

Trojan horse

A Trojan horse is an independent program that, when called by an authorized user, performs a useful function, but also performs unauthorized functions, often usurping the privileges of the user.

Troll

The act of subverting a forum by deliberately posting provocative (especially provocatively stupid) messages with the intention of distracting others into response.

Unallocated file space

Unallocated file space and file slack are both important sources of leads for the computer forensics investigator. The data-storage area in a factory-fresh hard disk drive typically contains patterns of sectors that are filled with patterns of format characters. In DOS and Windows-based computer systems, the format pattern for a floppy diskette usually consists of binary data in the form of hex F6s. The same format pattern is sometimes used in the format of hard disk drives, but the format patterns can consist of essentially any repeat character as determined by the factory test machine that made the last writes to the hard disk drive. The format pattern is overwritten as files and subdirectories are written in the data area.

Unzip

To unzip is to extract (see extract) a Zip archive.

UUencode

Many file formats are 8-bit (also called binary), which means that the basic unit of information—a byte—comprises 8 on/off signals. E-mail, however, is a 7-bit (or text) medium, preventing the transfer of 8-bit data. UUencoding compensates for this restriction by converting 8-bit data to 7-bit data. UUencode accomplishes this by joining all of the file’s bits together into a single stream, and then dividing the stream into 7-bit chunks. The data are then e-mailed and received by someone who must UUdecode it.

Vandal

As contrasted with crackers and criminals in a tripartite taxonomy of cyberspace intruders, this term is used to denote anyone whose goal is to destroy information and/or information systems in the course of their intrusion attempts.

Video adapter

An expansion card or chip set built into a motherboard that provides the capability to display text and graphics on the computer’s monitor. If the adapter is part of an expansion card, it also includes the physical connector for the monitor cable. If it is a chip set on the motherboard, the video connector will be on the motherboard also.

Virtual battlespace

The ether occupied by communications impulses, databases, and computer codes. In this usage, the term is synonymous with cyber medium, cyberspace, and infosphere.

Virtual realm

A synonym for information realm or cyberspace.

Virus

The generic label for a unary set of code that is designed to operate so as to cause mischief or other subversive effect in a target computer system.

Vulnerability

With specific regard to IW—a known or suspected flaw in the hardware or software or operation of a system that exposes the system to penetration or its information to accidental disclosure.



 < Day Day Up > 



Computer Forensics. Computer Crime Scene Investigation
Computer Forensics: Computer Crime Scene Investigation (With CD-ROM) (Networking Series)
ISBN: 1584500182
EAN: 2147483647
Year: 2002
Pages: 263
Authors: John R. Vacca

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net