Previous
Next
Table of Contents
- Host: A computer system attached to a network
- Firewall: A component or set of components that restricts access
between a protected network and the Internet, or between other sets of
networks.
- Bastion Host: A computer system that must be highly
secured because it is vulnerable to attack, usually because it is
exposed to the Internet and is a main point of contact for users of
internal networks. It gets its name from the highly fortified
projects on the outer walls of medieval castles. Bastions overlook
critical areas of defense, usually having strongs walls, room for
extra troops, and the occasional useful tub of boiling hot oil for
discouraging attackers.
- Dual-homed Host: A general-purpose computer system that
has at least two network interfaces.
- Packet: The fundamental unit of communication on the
Internet.
- Packet Filtering: The action a device takes to
selectively control the flow of data to and from a network. Packet
filters allow or block packets, usually while routing them from one
network to another (most often from the Internet to an internal
network, and vice-versa). accomplish packet filtering, you set up a
set of rules that specifiy what types of packets (those to or from a
particular IP address or port) are to be allowed and what types are to
be blocked.
- Perimeter network: A network added between a protected
network and an external network, in order to provide an additional
layer of security. A perimeter network is sometimes called a DMZ.
- Proxy server: A program that deals with external
servers on behalf of internal clients. Proxy clients talk to proxy
servers, which relay approved client requests on to real servers, and
relay answers back to clients.
- Denial of Service: A denial of service attack is when
an attacker consumes the resources on your computer for things it was
not intended to be doing, thus preventing normal use of your network
resources to legimite purposes.
- Buffer Overflow: Common coding style is never to
allocate buffers "large enough" and not checking for overflows. When
such buffers are overflows, the executing program (daemon or set-uid
program) can be tricked in doing some other things. Generally this
works by overwriting a function's return address on the stack to point
to another location.
- IP Spoofing: IP-Spoofing is a complex technical attack
that is made up of several components. It is a security exploit that
works by tricking computers in a trust-relationship that you are
someone that you really aren't. There is an extensive paper written
by daemon9, route, and infinity in the Volume Seven, Issue
Fourty-Eight issue of Phrack Magazine.
- Authentication: The property of knowing that the data
received is the same as the data that was sent and that the claimed
sender is in fact the actual sender.
- Non-repudiation: The property of a receiver being able
to prove that the sender of some data did in fact send the data even
though the sender might later desire to deny ever having sent that
data.
Previous
Next
Table of Contents