D


[D]

Dark-Side Hacker

A criminal or malicious hacker.

DARPA

Defense Advanced Research Projects Agency.

Data-Driven Attack

A form of attack that is encoded in innocuous-seeming data and is executed by a user or a process to implement an attack. A data-driven attack is a concern for firewalls, because it may get through the firewall in data form and launch an attack against a system behind the firewall.

Data Encryption Standard (DES)

  1. An unclassified crypto-algorithm adopted by the National Bureau of Standards for public use.

  2. A cryptographic algorithm for the protection of unclassified data, published in Federal Information Processing Standard (FIPS) 46. The DES, which was approved by the National Institute of Standards and Technology (NIST), is intended for public and government use.

Defense Information Infrastructure (DII)

The shared or interconnected system of computers, communications, data applications, security, people, training, and other support structures serving the DoDs local, national, and worldwide information needs. DII connects DoD mission support, C2, and intelligence computers through voice, telecommunications, imagery, video, and multimedia services. It provides information processing and services to subscribers over the Defense Information Systems Network and includes C2, tactical, intelligence, and commercial communications systems used to transmit DoD information (pending approval in JP 1-02).

Defensive Information Operations

A process that integrates and coordinates policies and procedures, operations, personnel, and technology to protect information and defend information systems. Defensive information operations are conducted through information assurance, physical security, operations security, counter-deception, counter-psychological operations, counter-intelligence, electronic protect, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access while denying adversaries the opportunity to exploit friendly information and information systems for their own purposes (pending approval in JP 1-02).

Demon Dialer

A program that repeatedly calls the same telephone number. This is benign and legitimate for access to a BBS but malicious when used as a denial of service attack.

Denial of Service (DoS)

Action(s) that prevent any part of an AIS from functioning in accordance with its intended purpose.

Derf

The act of exploiting a terminal that someone has absent-mindedly left logged on.

DES

See Data Encryption Standard (DES).

DNS Spoofing

Assuming the DNS name of another system by either corrupting the name service cache of a victim system or by compromising a domain name server for a valid domain.




Investigative Data Mining for Security and Criminal Detection
Investigative Data Mining for Security and Criminal Detection
ISBN: 0750676132
EAN: 2147483647
Year: 2005
Pages: 232
Authors: Jesus Mena

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net