Beruflich Dokumente
Kultur Dokumente
The technical terms in this glossary are not comprehensive, they are intended only as a
basic aid to understanding the pages on this website. A much more
comprehensive Jargon Buster can be found on the government’s Get Safe Online
website.
Word/Term Definition
The process to verify that someone is who they claim to be when they
Authentication
try to access a computer or online service.
Bring your own The authorised use of personally owned mobile devices such as
device (BYOD) smartphones or tablets in the workplace.
Internet service
Company that provides access to the internet and related services.
provider (ISP)
Intrusion detection Program or device used to detect that an attacker is or has attempted
system (IDS) unauthorised access to computer resources.
Intrusion prevention Intrusion detection system that also blocks unauthorised access when
system (IPS) detected.
‘Just in time’ Manufacturing to meet an immediate requirement, not in surplus or in
manufacturing advance of need.
Local area network Communications network linking multiple computers within a defined
(LAN) location such as an office building.
Personal
Personal data relating to an identifiable living individual.
information
Security control Something that modifies or reduces one or more security risks.
Security information
and event Process in which network information is aggregated, sorted and
management (SIEM) correlated to detect suspicious activities.
Security perimeter A well-defined boundary within which security controls are enforced.
Malware that is loaded onto a computer and then run without the
Virus
user’s knowledge or knowledge of its full effects.
Wide area network Communications network linking computers or local area networks
(WAN) across different locations.
Glossary
Terms
and
Concepts
Access - Differentiated by authorized and unauthorized. In order to gain access within the network, you
must have permission via a username and password. Use of someone else's username and password
constitutes unauthorized access.
Bandwidth - The amount of data that can be transmitted in a fixed amount of time. For digital devices,
the bandwidth is usually expressed in bits per second (bps) or bytes per second.
Enumeration - A hacking technique used to identify information about a system for the purpose of
discovering vulnerabilities within the network, actively connecting to the network and trying to identify
such things as valid user accounts, poorly protected resource shares, or other potential penetrable areas
of the system.
Firewall - A system designed to prevent unauthorized access to or from a private network. Firewalls can
be implemented in both hardware and software, or a combination of both. Firewalls are frequently used
to prevent unauthorized Internet users from accessing private networks connected to the Internet,
especially intranets. All messages entering or leaving the intranet pass through the firewall, which
examines each message and blocks those that do not meet the specified security criteria.
Hacking - A generic term for penetrating a computer or computer system with malicious intent. Includes
use of hacking tools to gain unauthorized access, damage system functionality, or the spreading of
viruses, worms, and other malicious software code.
Information Technology - computers, networks, systems, and peripherals used to create,
communicate, process, and store digital information.
Information Technology Ethics - The study of ethics and ethical behavior as it relates to the use of
Information Technology.
Integrity - (As in data integrity) Refers to the validity of data.
MP3 - A type of software compression used to compress music files at near-CD quality for easy
transmission over the Internet.
Network - A group of two or more computer systems linked together.
Script Kiddie - A person, normally someone who is not technologically sophisticated, who randomly
seeks out a specific weakness over the Internet in order to gain root access to a system without really
understanding what it is s/he is exploiting because the weakness was discovered by someone else. A
script kiddie is not looking to target specific information or a specific company but rather uses knowledge
of a vulnerability to scan the entire Internet for a victim that possesses that vulnerability.
System Administrator - An individual responsible for maintaining a computer network. Typical duties
include adding and configuring new workstations, System software installation, administering system
security policy, and general maintenance of the network. The system administrator is sometimes called
the sysadmin or the systems administrator. Small organizations may have just one system administrator,
whereas larger enterprises usually have a whole team of system administrators.
System Monitoring - DoD policy indicates that systems MAY be monitored. There are various software
packages (known as sniffers) on the market available to conduct monitoring. Things that can be
monitored are email traffic, internet website visits, programs ran on a particular machine, and chat room
conversations from AOL, ICQ, Yahoo Chat, and AOL Instant Messenger. Some software to monitor
Internet traffic can be alerted by programmable keywords, such as "terrorist," "nuclear bomb," or "jihad."
These programs alert System Administrators when they are triggered, so it does not require the active
surveillance by an individual.
Sysop - (System Operator) Anyone responsible for the physical operations of a computer system or
network resource. For example, a System Administrator decides how often backups and maintenance
should be performed and the System Operator performs those tasks.
Sniffer - A program and/or device that monitors data traveling over a network. Sniffers can be used both
for legitimate network management functions and for stealing information off a network. Unauthorized
sniffers can be extremely dangerous to a network's security because they are virtually impossible to
detect and can be inserted almost anywhere. This makes them a favorite weapon in the hacker's
arsenal.