IT Security Terms

Router

r

Router ==> Device that transfers (routes) packets between two or more networks.

Fault tolerance

r

Fault tolerance ==> the ability of an IS to continue to operate when a failure accurs but usually for a limited time or at reduced level.

Spoofing

r

Spoofing ==> an attact carried out using a track, disguise, dseit or by faufing data.

Audit

r

Audit ==> the process of generating, recording, and reviewing a chrolonogical record of system events to ascertain their accurancy.

PlainText or Clear-text

r

PlainText or Clear-text ==> Readable text

Ciphertext

r

Ciphertext ==> Encrypted text

Backup

r

Backup ==> a deplicate copy of data or programs keep it in a secret location.

Biometrics

r

Biometrics ==> Method of identify a person based on a biological feature, such as a fingerprint.

Intrusion Detection System

r

Intrusion Detection System (IDS) ==> A defense tool used to monitor network traffic (packets) and provide alerts when there is suspicious traffic, or to quarantine suspicious traffic.

Denial of Service

Denial of Service

r

Denial Of Service (DOS) or Distributed denial of service (DDOS) ==> It is an attact in which a system is bombarded with so many requests (for service or access) that it crashes or cannot respond.

IP Address (Internet Protocol Address)

IP Address (Internet Protocol Address)

r

IP Address ( Internet Protocol Address) ==> An address that uniquely identifies a specific computer or other device on a network.

Vulnerability

r

Vulnerability ==> Weakness that threatens the confidentiality, integrity, or availability of an asset.

Risk

r

Risk ==> It is the probability of a threat exploiting a vulnerability.

Botnet

r

Botnet (Bot Network) ==> A network of hijacked computers that are controlled remotely - typically to launch spam or spyware. Also called software robots. Bot networks are linked to a range of malicious activity, including indentity theft and spam.

Threat

r

Threat ==> It is Something or someone that may result in harm to an asset

Packet

Packet

r

Packet ==> A Unit of data for transmission over a network with a header containing the source and destination of the packet.

AuthenticationAuth

r

Authentication ==> Method ( usualy based on username and password ) by which an IS validate or verifies that a user is really who he or she claims to be.

Spywar

r

Spywar ==> steals software that gothres information about a user or users ionline activity.

Malware

r

Malware ==> Malicious software, such as a virus, worm, or throjan horse.

Endpoint Security

r

Endpoint Security ==> Security measure to protect the endpoints, such as desktops and laptos, in the enerprice.

Perimeter Security

r

Perimeter Security ==> Security measure to ensure that authorized users gain access to the network.

CIA Traid

r

CIA Traid ( Confidentiality, integrity, availability) ==> The three main principle of IT Security

Zombie

r

Zombie ==> an effect computrer that effect remotely via internet by an authorized user such as spammer, fraudster or hacker.

Exploit

r

Exploit ==> A tool or technique that takes advantage of a vulnerability.

Firewall

r

Firewall ==> A method of (hardware or software) of guarding a private network from a public network (Internet) by analysing data packets entering or exiting it.

Countermeasure

r

Countermeasure ==> Safeguard implemented to mitigate ( lessen) risk.

Access Control

r

Access Control ==> It is security feature designed to restrict who has access to a network, IS, or data. Access to resources on a computer is restricted using a logical or physical control designed to protect against unauthorized entry or use.

Risk Management

r

Risk Management ==> Process of identifying, assessing and reducing risk to an acceptable level.

Exposure

r

Exposure ==> The estimated cost, loss, or damage that can result if a threat exploits a vulnerability

Encryption

Encryption

r

Encryption ==> Transformation Data into scrambled code to protect it from being understood by unauthorized users.

Public Key infrastracture (PKI)

r

Public Key Infrastracture (PKI) ==> A system to identify and authenticate the sender or reciver of an internet message or transaction.