Transmission Control Protocol/Internet Protocol—the suite of protocols the Internet is based on.
A software tool for security that provides additional network logging and restricts service access to authorized hosts by service.
A security policy based on global rules imposed for all users. These rules usually rely on a comparison of the sensitivity of the resources being accessed and the possession of corresponding attributes of users, groups of users, or entities acting on behalf of users.
Allows an attacker on a certain machine to control any terminal session that is in progress. An attack hacker can send and receive terminal I/O while a user is on the terminal.
The means through which the ability or intent of a threat agent to adversely affect an automated system, facility, or operation can be manifested. A potential violation of security.
Methods and things used to exploit a vulnerability in an information system, operation, or facility; fire, natural disaster, and so forth.
Process of formally evaluating the degree of threat to an information system and describing the nature of the threat.
A software tool, that scans for system weaknesses.
Government- and industry-sponsored teams of computer experts who attempt to break down the defenses of computer systems in an effort to uncover and eventually patch security holes.
A monitoring program used to scan incoming network connections and generate alerts when calls are received from particular sites, or when logins are attempted using certain IDs.
The map or plan of the network. The physical topology describes how the wires or cables are laid out and the logical or electrical topology describes how the information flows.
In a packet-switching network, a unique packet that causes a report of each stage of its progress to be sent to the network control center from each visited system element.
An operation of sending trace packets for determining information; traces the route of UDP packets for the local host to a remote host. Normally traceroute displays the time and location of the route taken to reach its destination computer.
A security model rule stating that the security level of an active object cannot change during the period of activity.
A software tool for security. Basically, it works with a database that maintains information about the byte count of files. If the byte count has changed, it will identify it to the system security manager.
An apparently useful and innocent program containing additional hidden code that allows the unauthorized collection, exploitation, falsification, or destruction of data.
A system that employs sufficient hardware and software assurance measures to allow its use for simultaneous processing of a range of sensitive or classified information.
The totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which are responsible for enforcing a security policy. A TCB consists of one or more components that together enforce a unified sewcurity policy over a product or system.
The specific security features, the assurance requirements, and the rating structure of the Orange Book as extended to networks of computers ranging from isolated LANs to WANs.
A hacker tool that allows hackers with even a small amount of skill to hijack terminals. It has a GUI interface.