security howto 12 sezbwv7n6y47gabon75tio6lcgxevwjrrm4eeta sezbwv7n6y47gabon75tio6lcgxevwjrrm4eeta SEZBWV7N6Y47GABON75TIO6LCGXEVWJRRM4EETA


Linux Security HOWTO: Glossary 12. GlossaryHost: A computer system attached to a networkFirewall: A component or set of components that restricts access between a protected network and the Internet, or between other sets of networks.Bastion Host: A computer system that must be highly secured because it is vulnerable to attack, usually because it is exposed to the Internet and is a main point of contact for users of internal networks. It gets its name from the highly fortified projects on the outer walls of medieval castles. Bastions overlook critical areas of defense, usually having strongs walls, room for extra troops, and the occasional useful tub of boiling hot oil for discouraging attackers.Dual-homed Host: A general-purpose computer system that has at least two network interfaces.Packet: The fundamental unit of communication on the Internet.Packet Filtering: The action a device takes to selectively control the flow of data to and from a network. Packet filters allow or block packets, usually while routing them from one network to another (most often from the Internet to an internal network, and vice-versa). accomplish packet filtering, you set up a set of rules that specifiy what types of packets (those to or from a particular IP address or port) are to be allowed and what types are to be blocked.Perimeter network: A network added between a protected network and an external network, in order to provide an additional layer of security. A perimeter network is sometimes called a DMZ.Proxy server: A program that deals with external servers on behalf of internal clients. Proxy clients talk to proxy servers, which relay approved client requests on to real servers, and relay answers back to clients.Denial of Service: A denial of service attack is when an attacker consumes the resources on your computer for things it was not intended to be doing, thus preventing normal use of your network resources to legimite purposes.Buffer Overflow: Common coding style is never to allocate buffers "large enough" and not checking for overflows. When such buffers are overflows, the executing program (daemon or set-uid program) can be tricked in doing some other things. Generally this works by overwriting a function's return address on the stack to point to another location.IP Spoofing: IP-Spoofing is a complex technical attack that is made up of several components. It is a security exploit that works by tricking computers in a trust-relationship that you are someone that you really aren't. There is an extensive paper written by daemon9, route, and infinity in the Volume Seven, Issue Fourty-Eight issue of Phrack Magazine.Authentication: The property of knowing that the data received is the same as the data that was sent and that the claimed sender is in fact the actual sender.Non-repudiation: The property of a receiver being able to prove that the sender of some data did in fact send the data even though the sender might later desire to deny ever having sent that data. :

Wyszukiwarka

Podobne podstrony:
security howto 7 bif7pmbdlmrob6tcblpvwkf37huqfjqc5eeufry bif7pmbdlmrob6tcblpvwkf37huqfjqc5eeufry
printing howto 12 iizcwkqa3ivaohfbc676kdj6r7jr73yhxcmopci
nis howto 12 477ykmyefaabz7pjxngagtibkkicjlh7k6hutji
keyboard and console howto 12 4jv4i6pgihwufxdzd424u24tcxbbqgebtu6f7qa
var howto 12 ruiu6mbi7boaa7mfhe463dkbdlbqr63q3u3khua ruiu6mbi7boaa7mfhe463dkbdlbqr63q3u3khua
virtual services howto 12 j3g6bse7dyfgwtx25cs6tpeew2bl3qiithmbc5i j3g6bse7dyfgwtx25cs6tpeew2bl3qiith
security howto 10 tvgtmcpwo322hl5vo7uep26qcjhacrhtfsnf7nq tvgtmcpwo322hl5vo7uep26qcjhacrhtfsnf7nq
security howto 13 442ylxnyi72eqfya3rkcmf3aqybwose2mqs7tha 442ylxnyi72eqfya3rkcmf3aqybwose2mqs7tha
pci howto 12 yqha2c3wu6vtlr5db6caw4elhsx7uuxu5he76qq yqha2c3wu6vtlr5db6caw4elhsx7uuxu5he76qq
consultants howto 12
security howto 3 zpephbiqdl4t6dtrzvfpzajgtecytw6eezc3z3q zpephbiqdl4t6dtrzvfpzajgtecytw6eezc3z3q
xfree86 video timings howto 12 bo7d3dnpbmvpezf3ckjealjpfmpnxrnxkxf6pea bo7d3dnpbmvpezf3ckjealjpfmpnx
ftape howto 12
multi disk howto 12 mu4rbybkd7jm7c7dxh3wgyeki6fud54elxacxgi mu4rbybkd7jm7c7dxh3wgyeki6fud54elxacxgi
security howto 14 z3b5loblb2pw4qjxpvcaxiw3pe7hvjayyyf5esq z3b5loblb2pw4qjxpvcaxiw3pe7hvjayyyf5esq
postgresql howto 12 mz3vntmiyza2ob7rqi4g2bh2j7gog3ykasqkeqy
security howto 2 chtz4dahk7w65lxpd7g56vamt2uy3fxv4rogaky chtz4dahk7w65lxpd7g56vamt2uy3fxv4rogaky

więcej podobnych podstron