Difference between revisions of "Keyword Index and Glossary of Core Ideas"
Line 388: | Line 388: | ||
==Transparency== | ==Transparency== | ||
A set of policies, practices and procedures that allow citizens to have accessibility, usability, informativeness, understandability and auditability of information and process held by centers of authority. | A set of policies, practices and procedures that allow citizens to have accessibility, usability, informativeness, understandability and auditability of information and process held by centers of authority. | ||
+ | |||
+ | References: | ||
+ | |||
+ | [http://cyber.law.harvard.edu/cybersecurity/Research_Agenda_for_the_Banking_and_Finance_Sector Financial Services Sector Coordinating Council for Critical Infrastructure Protection] | ||
===Trojan=== | ===Trojan=== |
Revision as of 09:35, 18 June 2010
Glossary of Core Ideas
Air-Gapped Network
Air gapping is a security measure that isolates a secure network from unsecure networks physically, electrically and electromagnetically.
See also: Sneakernet
References:
Antivirus
Software which attempts to identify and delete or isolate malware. Antivirus software may use both a database containing signatures of known threats and heuristics to identify malware. Usually run as a background service to scan files and email copied to the protected system.
References:
Black Hat
A black hat is a computer hacker who works to harm others (e.g., steal identities, spread computer viruses, install bot software).
See also: White Hat
References:
Blacklist
A list of computers, IP addresses, user names or other identifiers to block from access to a computing resource.
See also: Whitelist
References:
Botnet
A portmanteau of robot and network.) Refers to networks of sometimes millions of infected machines that are remotely controlled by malicious actors. A single infected computer may be referred to as a zombie computer. The owners of the computer remotely controlled is often unaware of the infection. The owners of a botnet may use the combined network processing power and bandwidth to send SPAM, install malware and mount DDoS attacks or may rent out the botnet to other malicious actors.
References:
Casus Belli
The justification for going to war. From the Latin "casus" meaning "incident" or "event" and "belli" meaning "of war."
References:
Civilian Participation
The involvement of non-military persons in warfare. While civilians have often provided support to the military in kinetic wars, in cyber warfare civilians are able to remotely participate in direct attacks against opponents. This raises complicated questions of law when the combatants are not uniformed military personnel.
References:
Combatant Status
The legal status of combatants in warfare. Existing law distinguishes between uniformed military and civilian status.
References:
Computer Emergency Response Team
A group of experts brought together to deal with computer security issues. The Computer Emergency Response Team (CERT) mandate is to develop and promote best management practices and technology applications to “resist attacks on networked systems, to limit damage, and to ensure continuity of critical services.” (Software Engineering Institute 2008). CERT may be formed by governments to handle security at the national level or by academic institutions or individual corporations.
References:
Computer Network Attack
Includes actions taken via computer networks to disrupt, deny, degrade, or destroy the information within computers and computer networks and/or the computers/networks themselves. Joint Doctrine for Information Operations JP 3-13 at I-9 (1998)
References:
Communications Privacy Law
Laws which regulate access to electronic communications. In the United States, the Electronic Communications Privacy Act (ECPA) protects electronic communications while in transit and prohibits the unlawful access and disclosure of communication contents.
References:
Credit Card Fraud
Theft of goods or services using false or stolen credit card information.
See Also: Shoulder Surfing
References:
Crimeware
Software tools designed to aid criminals in perpetrating online crime. Refers only to programs not generally considered desirable or usable for ordinary tasks. Thus, while a criminal may use Internet Explorer in the commission of a cybercrime, the Internet Explorer application itself would not be considered crimeware.
References:
Cyber Crime
In its broadest definition, cybercrime includes all crime perpetrated with or involving a computer. Symantec defines it as any crime that is committed using a computer or network, or hardware device. The computer or device may be the agent of the crime, the facilitator of the crime, or the target of the crime. The crime may take place on the computer alone or in addition to other locations. Symantec
References:
Cyber Terrorism
A criminal act perpetrated by the use of computers and telecommunications capabilities, resulting in violence, destruction and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a particular political, social, or ideological agenda. FBI
References:
Cyber Warfare
Actions by a nation-state to penetrate another nation’s computers or networks for the purposes of causing damage or disruption. Clarke
References:
Data Mining
The process of extracting hidden information and correlations from one or more databases or collections of data that would not normally be revealed by a simple database query.
References:
Department of Homeland Security
Cabinet level department of the United States assigned, inter alia, the task of protecting against terrorist threats and helping state and local authorities prepare for, respond to and recover from domestic disasters.
References:
Digital Pearl Harbor
A cyberwarfare attack similar in scale and surprise to the 1941 attack on Pearl Harbor. The expression is often invoked by those who argue that a cyber-based attack is either imminent or inevitable and that by not being properly prepared, the United States will suffer significant and unnecessary losses.
References:
DDoS Attack
The disabling of a targeted website or Internet connection by flooding it with such high levels of Internet traffic that it can no longer respond to normal connection requests. Often mounted by directing an army of zombie computers (see botnet) to connect to the targeted site simultaneously. The targeted site may crash while trying to respond to an overwhelming number of connections requests or it may be disabled because all available bandwidth and/or computing resources are tied up responding to the attack requests.
References:
Distributed Denial of Service (DDoS)
See: DDoS Attack
Dumpster Diving
A method of obtaining proprietary, confidential or useful information by searching through trash discarded by a target.
References:
Einstein
The operational name of the National Cybersecurity Protection System (NCPS). Cas created in 2003 by the United States Computer Emergency Readiness Team (US-CERT)14 in order to aid in its ability to help reduce and prevent computer network vulnerabilities across the federal government. The initial version of Einstein provided an automated process for collecting, correlating, and analyzing agencies’ computer network traffic information from sensors installed at their Internet connections. The Einstein sensors collected network flow records15 at participating agencies, which were then analyzed by US-CERT to detect certain types of malicious activity.
References:
E.U. Cybersecurity
Discussions relating to cybersecurity of the European Union and of European Union states.
References:
Geneva Conventions
Four treaties and three additional protocols that regulates the conduct of hostilities between states and set the standards for humanitarian treatment of the victims of war.
See also: Laws of War
References:
Hacker
Advanced computer users who spend a lot of time on or with computers and work hard to find vulnerabilities in IT systems. DCSINT
References:
Hacktivism
The nonviolent use of illegal or legally ambiguous digital tools in pursuit of political ends. These tools include web site defacements, redirects, denial-of-service attacks, information theft, web site parodies, virtual sit-ins, virtual sabotage, and software development. Samuel, A.
References:
Hacktivist
Combination of hacker and activist. Individuals that have a political motive for their activities, and identify that motivation by their actions, such as defacing opponents’ websites with counter-information or disinformation.
See also: Hacktivism
References:
Honeypot
A computer, network or other information technology resource set as a trap to attract attacks. Honeypots may be used to collect metrics (how long does it take for an unprotected system to be breached), to test defenses, to examine methods of attack or to catch attackers. A honeypot system may also be used to collect SPAM so it can be added to a blacklist.
References:
Identity Fraud/Theft
The exploitation by malevolent third parties of unwarranted access to clients' or consumers' identities. Often the result of lax data security or privacy measures.
References:
Intelligence Infrastructure/Information Infrastructure
The network of computers and communication lines underlying critical services that American society has come to depend on: financial systems, the power grid, transportation, emergency services, and government programs. Information infrastructure includes the Internet, telecommunications networks, “embedded” systems (the built-in microprocessors that control machines from microwaves to missiles), and “dedicated” devices like individual personal computers. Council on Foreign Relations
References:
Interdependencies
The inter-connections between supposedly independent but often interdependent systems.
See also: SCADA Systems
References:
International Humanitarian Law
That part of international law which seek, for humanitarian reasons, to limit the effects of armed conflict. It protects persons who are not or are no longer participating in the hostilities and restricts the means and methods of warfare. International humanitarian law is also known as the law of war or the law of armed conflict. International law is the body of rules governing relations between States. It is contained in agreements between States (treaties or conventions), in customary rules, which consist of State practise considered by them as as legally binding, and in general principles. ICRC
References:
Internet Relay Chat (IRC)
A method of real-time Internet communication often used by criminals to buy and sell purloined information such as credit card numbers and personal identity information. IRC chatrooms may be open or private.
References:
Internet Service Providers
A company that offers access to the Internet. Internet Service Providers may also provide add-on services such as web hosting, electronic mail, virus scanning, SPAM filtering, etc.
References:
Keylogger
Software or hardware that monitors and logs the keystrokes a user types into a computer. The keylogger may store the key sequences locally for later retrieval or send them to a remote location. A hardware keylogger can only be detected by physically inspecting the computer for unusual hardware.
References:
Lawfare
The use of international law to damage an opponent in a war without use of arms.
References:
Laws of War
The body of law that define the legality of using armed force to resolve a conflict (jus ad bellum) and the laws that define the legality of the actual hostilities and related activities (jus in bello).
References:
Malware
A variety of computer software designed to infiltrate a user's computer specifically for malicious purposes. Includes, inter alia, computer virus software, botnet software, computer worms, spyware, trojan horses, crimeware and rootkits.
References:
National Cybersecurity Strategy (U.S.)
A comprehensive policy to secure America’s digital infrastructure as part of the Administrative Branch's Comprehensive National Cybersecurity Initiative. The goals of the policy are: to establish a front line of defense against current immediate threats; to defend against threats by enhancing U.S. counterintelligence capabilities and; to strengthen the future cybersecurity environment by expanding cyber education and redirecting research and development efforts to define and develop strategies to deter hostile or malicious activity in cyberspace.
References:
National Security
Broadly refers to the requirement to maintain the survival of the nation-state through the use of economic, military and political power and the exercise of diplomacy. Wikipedia
References:
Organized Crime
Outreach and Collaboration
Password Weakness
Security threats due to easily guessable passwords which protect vital stores of confidential information stored online.
References:
Phishing
The criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.
Privacy Law
Risk Modeling
Research & Development
Commission on Improving Cybersecurity Research in the U. S.
Financial Services Sector Coordinating Council for Critical Infrastructure Protection
SCADA Systems
Scareware
Script Kiddie
Shoulder Surfing
Social Engineering
Social Network
SPAM
Sponsored Attacks
State Affiliation
Transparency
A set of policies, practices and procedures that allow citizens to have accessibility, usability, informativeness, understandability and auditability of information and process held by centers of authority.
References:
Financial Services Sector Coordinating Council for Critical Infrastructure Protection
Trojan
Virtual Military Technologies
Virtual Warfare
White Hat
Whitelist
A list of computers, IP addresses, user names or other identifiers to specifically allow access to a computing resource. Normally combined with a default "no-access" policy.
See also: Blacklist