Linux Security HOWTO: Glossary
12. GlossaryHost: A computer system attached to a networkFirewall: A component or set of components that restricts access
between a protected network and the Internet, or between other sets of networks.Bastion Host: A computer system that must be highly
secured because it is vulnerable to attack, usually because it is
exposed to the Internet and is a main point of contact for users of
internal networks. It gets its name from the highly fortified
projects on the outer walls of medieval castles. Bastions overlook
critical areas of defense, usually having strongs walls, room for
extra troops, and the occasional useful tub of boiling hot oil for
discouraging attackers.Dual-homed Host: A general-purpose computer system that
has at least two network interfaces.Packet: The fundamental unit of communication on the
Internet.Packet Filtering: The action a device takes to
selectively control the flow of data to and from a network. Packet
filters allow or block packets, usually while routing them from one
network to another (most often from the Internet to an internal
network, and vice-versa). accomplish packet filtering, you set up a
set of rules that specifiy what types of packets (those to or from a
particular IP address or port) are to be allowed and what types are to
be blocked.Perimeter network: A network added between a protected
network and an external network, in order to provide an additional
layer of security. A perimeter network is sometimes called a DMZ.Proxy server: A program that deals with external
servers on behalf of internal clients. Proxy clients talk to proxy
servers, which relay approved client requests on to real servers, and
relay answers back to clients.Denial of Service: A denial of service attack is when
an attacker consumes the resources on your computer for things it was
not intended to be doing, thus preventing normal use of your network
resources to legimite purposes.Buffer Overflow: Common coding style is never to
allocate buffers "large enough" and not checking for overflows. When
such buffers are overflows, the executing program (daemon or set-uid
program) can be tricked in doing some other things. Generally this
works by overwriting a function's return address on the stack to point
to another location.IP Spoofing: IP-Spoofing is a complex technical attack
that is made up of several components. It is a security exploit that
works by tricking computers in a trust-relationship that you are
someone that you really aren't. There is an extensive paper written
by daemon9, route, and infinity in the Volume Seven, Issue
Fourty-Eight issue of Phrack Magazine.Authentication: The property of knowing that the data
received is the same as the data that was sent and that the claimed
sender is in fact the actual sender.Non-repudiation: The property of a receiver being able
to prove that the sender of some data did in fact send the data even
though the sender might later desire to deny ever having sent that
data.
:
Wyszukiwarka
Podobne podstrony:
security howto 7 bif7pmbdlmrob6tcblpvwkf37huqfjqc5eeufry bif7pmbdlmrob6tcblpvwkf37huqfjqc5eeufryprinting howto 12 iizcwkqa3ivaohfbc676kdj6r7jr73yhxcmopcinis howto 12 477ykmyefaabz7pjxngagtibkkicjlh7k6hutjikeyboard and console howto 12 4jv4i6pgihwufxdzd424u24tcxbbqgebtu6f7qavar howto 12 ruiu6mbi7boaa7mfhe463dkbdlbqr63q3u3khua ruiu6mbi7boaa7mfhe463dkbdlbqr63q3u3khuavirtual services howto 12 j3g6bse7dyfgwtx25cs6tpeew2bl3qiithmbc5i j3g6bse7dyfgwtx25cs6tpeew2bl3qiithsecurity howto 10 tvgtmcpwo322hl5vo7uep26qcjhacrhtfsnf7nq tvgtmcpwo322hl5vo7uep26qcjhacrhtfsnf7nqsecurity howto 13 442ylxnyi72eqfya3rkcmf3aqybwose2mqs7tha 442ylxnyi72eqfya3rkcmf3aqybwose2mqs7thapci howto 12 yqha2c3wu6vtlr5db6caw4elhsx7uuxu5he76qq yqha2c3wu6vtlr5db6caw4elhsx7uuxu5he76qqconsultants howto 12security howto 3 zpephbiqdl4t6dtrzvfpzajgtecytw6eezc3z3q zpephbiqdl4t6dtrzvfpzajgtecytw6eezc3z3qxfree86 video timings howto 12 bo7d3dnpbmvpezf3ckjealjpfmpnxrnxkxf6pea bo7d3dnpbmvpezf3ckjealjpfmpnxftape howto 12multi disk howto 12 mu4rbybkd7jm7c7dxh3wgyeki6fud54elxacxgi mu4rbybkd7jm7c7dxh3wgyeki6fud54elxacxgisecurity howto 14 z3b5loblb2pw4qjxpvcaxiw3pe7hvjayyyf5esq z3b5loblb2pw4qjxpvcaxiw3pe7hvjayyyf5esqpostgresql howto 12 mz3vntmiyza2ob7rqi4g2bh2j7gog3ykasqkeqysecurity howto 2 chtz4dahk7w65lxpd7g56vamt2uy3fxv4rogaky chtz4dahk7w65lxpd7g56vamt2uy3fxv4rogakywięcej podobnych podstron