﻿<Glossary>
	<Section Letter="A">
		<Entry>
			 <Term>ACK</Term>
			 <Definition>The "acknowledgement" flag that can be set in the TCP/IP packet header.  Most often seen in the TCP/IP 3-way handshake to set up communications.</Definition>
		</Entry>
		<Entry>
			 <Term>Active Directory</Term>
			 <Definition>Active directory technology is responsible for offering network security services, such as authentication, interoperation with other system directories, Domain Name System (DNS) naming, and a central storage repository for application data.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Adobe Flash</Term>
			 <Definition>Open source software that allows users to play Flash animation files</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Adobe Reader</Term>
			 <Definition>Open source software that allows users to view, print, and collaborate on pdf files</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>anomaly-based IDS method</Term>
			 <Definition>Detection method that looks for traffic activity that falls outside of normal traffic patterns (other methods include signature-based and protocol-based)</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>API</Term>
			 <Definition>Application Programming Interface is an interface that allows software programs to interact with each other.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>ARP</Term>
			 <Definition>Address Resolution Protocol</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>attack signature</Term>
			 <Definition>A characteristic byte pattern used in malicious code or an indicator, or set of indicators that allows the identification of malicious network activities.</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>availability</Term>
			 <Definition>The property of being accessible and useable upon demand by an authorized entity. NIST 800-53: Ensuring timely and reliable access to and use of information.</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
	</Section>
	<Section Letter="B">
		<Entry>
			 <Term>black hat</Term>
			 <Definition>Hackers who intentionally break into systems for malicious purposes, such as, to steal or destroy data, prevent legitimate users from accessing the system or network, and committing fraud, theft, vandalism, or other types of illegal activity </Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>blaster</Term>
			 <Definition>Worm that exploits RPC endpoint mapping. See also Nachi.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>bot</Term>
			 <Definition>Refers to malicious code that is installed on a computer to take command and control of the computer for the attacker’s own purposes. The controlled computer becomes a zombie, or member of a botnet, which can be used to steal data, host malicious content, and launch other attacks, including worms and viruses, to send spam. Also see botnet.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>botnet</Term>
			 <Definition>Collection of bots controlled by a bot herder. Also see bot.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>broadcast</Term>
			 <Definition>Data is transmitted to all network destinations, simultaneously addressed to all computers.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>brute-force attacks</Term>
			 <Definition>Attacks that systematically search for user passwords to hack into a system</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>BSD</Term>
			 <Definition>Berkeley Software Distribution (BSD) is a Unix-based operation system</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>buffer overflow</Term>
			 <Definition>A condition at an interface under which more input can be placed into a buffer or data holding area than the capacity allocated, overwriting other information. Attackers exploit such a condition to crash a system or to insert specially crafted code that allows them to gain control of the system.</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>buffer zone</Term>
			 <Definition>A non-technical term to refer to a sub-network between an an untrusted network and trusted network technically referred to as a DMZ</Definition>
			<Source></Source> 
		</Entry>
	</Section>
	<Section Letter="C">
		<Entry>
			 <Term>C2</Term>
			 <Definition>command and control</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>choke point</Term>
			 <Definition>In reference to network security, a choke point is a location on a network where traffic is funneled through a point that can be easily monitored and controlled.  Choke points are often established by network applicances such as firewall or routers.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>cipher text</Term>
			 <Definition>Data in its encrypted form.</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>CISCO</Term>
			 <Definition>CISCO Systems, Inc </Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>collision domain</Term>
			 <Definition>Network segment where data packets from different devices collide with one another, the data transmission is stopped, a jam signal is sent, and the transmission is tried again at later time.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>COMMON_CRITERIA</Term>
			 <Definition>The International Common Criteria for Information Technology Security Evaluation (CC) defines general concepts and principles of information technology (IT) security evaluation and presents a general model of evaluation. It presents constructs for expressing IT security objectives, for selecting and defining IT security requirements, and for writing high-level specifications for products and systems </Definition>
			<Source>DoDI 8500.2, Par E2.1.3</Source> 
		</Entry>
		<Entry>
			 <Term>Computer Browser (NetBIOS)</Term>
			 <Definition>Computer Browser service is the mechanism that collects and distributes the list of workgroups and domains and the servers within them.  It provides backward compatibility with computers running earlier versions of Windows that must use NetBIOS over TCP/IP and are not Active Directory-capable.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Conficker</Term>
			 <Definition>Most wide-spread worm since 2003, exploited vulnerabilities in NetBIOS</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>confidentiality</Term>
			 <Definition>The property that information is not disclosed to system entities (users, processes, devices) unless they have been authorized to access the information. NIST SP 800.53: Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>connectionless protocol</Term>
			 <Definition>Does not guarantee receipt of packets (e.g., IP)</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>cracker</Term>
			 <Definition>Hackers who attempt to circumvent or break security measures for malicious purposes</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>CSMA/CD</Term>
			 <Definition>Carrier Sense Multiple Access With Collision Domain</Definition>
			<Source></Source> 
		</Entry>
	</Section>
	<Section Letter="D">		
		<Entry>
			 <Term>DARPA</Term>
			 <Definition>Defense Advanced Research Projects Agency</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>datagram</Term>
			 <Definition>Another term for data packet</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>DCOM</Term>
			 <Definition>Distributed Component Object Model is part of a family of technologies that allow software components to communicate across network boundaries.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Defense-in-Depth</Term>
			 <Definition>DoD's layered approach to protecting its information and information systems, which includes preventive layers such as firewalls and anti-virus protection that actually stop attacks  </Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>denial-of-service</Term>
			 <Definition>The prevention of authorized access to resources or the delaying of time-critical operations. (Time-critical may be milliseconds or it may be hours, depending upon the service provided.)</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>Destination Address</Term>
			 <Definition>Provides the IP address of the intended receiver.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>DF</Term>
			 <Definition>Do Not Fragment</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>DHCP</Term>
			 <Definition>Dynamic Host Configuration Protocol is a network protocol that allows a server to automatically assign an IP address from a pool of addresses that are defined for the network.</Definition>
			<Source></Source> 
		</Entry>		
		<Entry>
			 <Term>DHCP Server</Term>
			 <Definition>Dynamic Host Configuration Protocol Server is a service that allows a server to dynamically distribute IP addressing and configuration information to clients. Normally the DHCP server provides the client with at least the basic information of IP address, subnet mask, and default gateway.  </Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>DMZ</Term>
			 <Definition>Demilitarized Zone is a perimeter network segment that is logically between internal and external networks. Its purpose is to enforce the internal network’s Information Assurance policy for external information exchange and to provide external, untrusted sources with restricted access to releasable information while shielding the internal networks from outside attacks.</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>DNS</Term>
			 <Definition>Domain Name System</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>DoD</Term>
			 <Definition>Department of Defense</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>DSL</Term>
			 <Definition>digital subscriber line</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>duplex system</Term>
			 <Definition>A telecommunications system composed of two devices able to communicate with each other in both directions.  Half-duplex and full-duplex are implementations of this system.</Definition>
			<Source></Source> 
		</Entry>
	</Section>
	<Section Letter="E">		
		<Entry>
			 <Term>encryption</Term>
			 <Definition>The process of changing plaintext into ciphertext for the purpose of security or privacy.</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>endpoint mapping</Term>
			 <Definition>Refers to how a server listens for incoming client requests and maps each request to its destination server process</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Ephemeral ports</Term>
			 <Definition>Ports that are reserved for temporary use by the client end of client-server communications. Also see Well Known ports.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>EPM</Term>
			 <Definition>endpoint mapper</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Exchange Server/Client</Term>
			 <Definition>The port list includes a conglomeration of ports and services utilized by Microsoft Exchange for the sending and receiving of email messages.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>/etc/shadow</Term>
			 <Definition>File that stores secure user account information in encrypted format.</Definition>
			<Source></Source> 
		</Entry>
	</Section>
	<Section Letter="F">
		<Entry>
			 <Term>false negative</Term>
			 <Definition>Refers to a malicious event for which the IDS fails to provide an alert</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>false positive</Term>
			 <Definition>Refers to a non-malicious event for which the IDS provides a malicious-event alert</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>First rule</Term>
			 <Definition>Fragmentation policy that does not overwrite previous fragments and gives priority to the first fragment, which is used by the Windows operating system. See also Last rule.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Flags</Term>
			 <Definition>Packet header field that determines whether routers are allowed to fragment a packet into segments. If fragmentation is allowed, then this field also identifies parts of the packet for the receiver.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Flow Label </Term>
			 <Definition>IPv6 header field that labels a set of packets with the same origin and destination, or flow, thus allowing IPv6 routers to handle packets with the same flow in the same way.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>footprint</Term>
			 <Definition>A method for discovering what software, applications, and services are on a targeted machine or device</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Frag3 preprocessor</Term>
			 <Definition>Configuration option in Snort that allows you to reassemble fragments in multiple ways: First, Last, or both. </Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Fragment Offset</Term>
			 <Definition>Packet header field that helps to reconstruct a fragmented packet at the next router in the link. The receiving system uses this field to identify the place of the fragment in the original datagram.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Fragrouter</Term>
			 <Definition>Fragrouter tool</Definition>
			<Source></Source> 
		</Entry>		
		<Entry>
			 <Term>FTP</Term>
			 <Definition>File Transfer Protocol</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Full duplex</Term>
			 <Definition>Communication occurs in both directions between a sender and a receiver simultaneously.</Definition>
			<Source></Source> 
		</Entry>
	</Section>
	<Section Letter="G">	
		<Entry>
			 <Term>GUI</Term>
			 <Definition>Graphical User Interface</Definition>
			<Source></Source> 
		</Entry>
	</Section>
	<Section Letter="H">	
		<Entry>
			 <Term>hacker</Term>
			 <Definition>Unauthorized user who attempts to or gains access to an information system </Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>hacktivist</Term>
			 <Definition>Type of hacker who is politically or socially motivated to break into and or attack information systems  </Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>half duplex</Term>
			 <Definition>Communication between two devices but in only one direction at a time. </Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>harden</Term>
			 <Definition>Server hardening includes techniques used to establish a security baseline on a system, particularly those connected to semi- or untrusted networks.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>header</Term>
			 <Definition>Portion of a data packet or datagram that contains identifying information such as the IP version number and the source and destination addresses.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Header Checksum</Term>
			 <Definition>Packet header field that protects the IPv4 header by identifying whether errors or data corruption occurred during transmission.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>HIDS</Term>
			 <Definition>Host-based Intrusion Detection System. See Host-based IDS.</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>hop limit</Term>
			 <Definition>Number of possible times a packet may hop, or be forwarded, from router to router. This field helps to identify any routing errors that can lead to packets getting stuck in infinite loops. The maximum hop limit in IPv6 is 255. See also hop count or TTL for IPv4.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Host-based IDS</Term>
			 <Definition>IDS that operates on information collected from within an individual computer system. This vantage point allows host-based IDSes to determine exactly which processes and user accounts are involved in a particular attack on the Operating System. Furthermore, unlike network-based IDSes, host-based IDSes can more readily “see” the intended outcome of an attempted attack, because they can directly access and monitor the data files and system processes usually targeted by attacks.</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>HP</Term>
			 <Definition>Hewlett Packard</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>HTTP</Term>
			 <Definition>Hypertext Transfer Protocol</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>HTTPS</Term>
			 <Definition>Hypertext Transfer Protocol Secure</Definition>
			<Source></Source> 
		</Entry>
	</Section>
	<Section Letter="I">	
		<Entry>
			 <Term>IANA</Term>
			 <Definition>Internet Assigned Numbers Authority</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>ICMP</Term>
			 <Definition>Internet Control Message Protocol</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>IDS</Term>
			 <Definition>Intrusion Detection System. See Intrusion Detection System.</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>		
		<Entry>
			 <Term>IETF</Term>
			 <Definition>Internet Engineering Task Force</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>IHL</Term>
			 <Definition>Internet Header Length is a packet header field that specifies the header size.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>IM</Term>
			 <Definition>instant messaging</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>IMAP</Term>
			 <Definition>Internet Message Access Protocol</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>infection vector</Term>
			 <Definition>Method used by malicious code to propagate itself or infect the computer</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>insider threat</Term>
			 <Definition>An entity with authorized access (i.e., within the security domain) that has the potential to harm an information system or enterprise through destruction, disclosure, modification of data, and/or denial of service.</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>integrity</Term>
			 <Definition>The property whereby an entity has not been modified in an unauthorized manner. NIST 800-53: Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>Internet</Term>
			 <Definition>The Internet is the single, interconnected, worldwide system of commercial, governmental, educational, and other computer networks that share (a) the protocol suite specified by the IAB and (b) the name and address spaces managed by the Internet Corporation for Assigned Names and Numbers (ICANN).</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>Internet Information Service</Term>
			 <Definition>Microsoft-developed web server.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>interoperability</Term>
			 <Definition>Capability of computers and networks to communicate with each other despite their different components and technologies</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>intrusion</Term>
			 <Definition>Unauthorized act of bypassing the security mechanisms of a system</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>Intrusion Detection System</Term>
			 <Definition>Hardware or software products that gather and analyze information from various areas within a computer or a network to identify possible security breaches, which include both intrusions (attacks from outside the organizations) and misuse (attacks from within the organizations)</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>IP</Term>
			 <Definition>Internet Protocol is a standard protocol for transmission of data from source to destinations in packet-switched communications networks and interconnected systems of such networks</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>IPv4</Term>
			 <Definition>Internet Protocol version 4 is a system of addresses used to identify entities on a network, which represents 32 bits of address data. Also see IPv6.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>IPv6</Term>
			 <Definition>Internet Protocol version 6 is a system of addresses used to identify entities on a network, which represents 128 bits of address data. Also see IPv4.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>IRC</Term>
			 <Definition>Internet Relay Chat is a multi-user multi-channel chat system that is neither client nor network specific.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>ISO</Term>
			 <Definition>International Organization for Standardization</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>ISP</Term>
			 <Definition>Internet service provider</Definition>
			<Source></Source> 
		</Entry>
	</Section>
	<Section Letter="J">	
		<Entry>
			 <Term>JOIN</Term>
			 <Definition>Join command</Definition>
			<Source></Source> 
		</Entry>
	</Section>
	<Section Letter="K">	
		<Entry>
			 <Term>Kubuntu</Term>
			 <Definition>A derivative of Ubuntu Linux that uses the KDE graphical environment as opposed to GNOME.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>#kubuntu </Term>
			 <Definition>IRC channel for Kubuntu</Definition>
			<Source></Source> 
		</Entry>
	</Section>
	<Section Letter="L">	
		<Entry>
			 <Term>LAN</Term>
			 <Definition>local area network</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Last rule</Term>
			 <Definition>Fragmentation policy that allows the current fragment to overwrite the previous fragment, which is typically used by the Linux operating system. See also First rule.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Linux</Term>
			 <Definition>A family of operating systems similar to UNIX but composed of open source tools, resources, and software.</Definition>
			<Source></Source> 
		</Entry>
	</Section>
	<Section Letter="M">	
		<Entry>
			 <Term>MAC address</Term>
			 <Definition>Media Access Control address - the unique identifier for each network assigned to network interface cards by the manufacturer.</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>malicious code</Term>
			 <Definition>Software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. A virus, worm, Trojan horse, or other code-based entity that infects a host. Spyware and some forms of adware are also examples of malicious code.</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>malware</Term>
			 <Definition>See malicious code.</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>man-in-the-middle attack</Term>
			 <Definition>A form of active wiretapping attack in which the attacker intercepts and selectively modifies communicated data to masquerade as one or more of the entities involved in a communication association.</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>many-to-one NAT</Term>
			 <Definition>An extension of NAT that permits multiple devices to be located behind and mapped to a single public IP address by translating both the IP address and associated port.  Also called Port Address Translation (PAT).</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>MF</Term>
			 <Definition>More Fragments</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>mirror port</Term>
			 <Definition>Port on a switch that is dedicated to receiving copies network traffic from each port on the switch.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>MSS</Term>
			 <Definition>Maximum Segment Size</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>MSSQL</Term>
			 <Definition>Microsoft Standard Query Language is the Microsoft implementation of the SQL relational database model.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>MTU</Term>
			 <Definition>Maximum Transmission Unit</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>multicast</Term>
			 <Definition>Transmitted data to multiple destinations, but not all network destinations, using special address assignments.</Definition>
			<Source></Source> 
		</Entry>
	</Section>
	<Section Letter="N">
		<Entry>
			 <Term>Nachi</Term>
			 <Definition>Worm that exploits RPC endpoint mapping. See also Blaster.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>NAT</Term>
			 <Definition>Network Address Translation is an Internet standard that allows one set of IP address to be used internally and a different set of addresses to be used externally for the purpose of a maximizing IP address space or masking internal IP addresses.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>NetLogon</Term>
			 <Definition>The NetLogon service verifies logon requests while registering, authenticating, and locating domain controllers.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>network</Term>
			 <Definition>Information system(s) implemented with a collection of interconnected components. Such components may include routers, hubs, cabling, telecommunications controllers, key distribution centers, and technical control devices.</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>network share</Term>
			 <Definition>Devices or pieces of information that can be accessed and shared by remote computers (e.g., shared files, folders, printers, and scanners)</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Network-based Intrusion Detection System</Term>
			 <Definition>IDS that detects attacks by capturing and analyzing network packets. Listening on a network segment or switch, one network-based IDS can monitor the network traffic affecting multiple hosts that are connected to the network segment.</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>Next Header</Term>
			 <Definition>IPv6 header field that identifies the first field of the packet data, or payload, which immediately follows the packet header. This field usually indicates the packet’s Transport layer protocol.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>NIDS</Term>
			 <Definition>Network-based intrusion detection system</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Nimda</Term>
			 <Definition>NetBIOS-based worm. See also Sasser.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Nmap</Term>
			 <Definition>Open source network scanning utility used for host discovery, network mapping, service identification, and auditing</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>NT</Term>
			 <Definition>New Technology (Windows)</Definition>
			<Source></Source> 
		</Entry>
	</Section>
	<Section Letter="O">
		<Entry>
			 <Term>Open Source</Term>
			 <Definition>Readily available and free</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Open Systems Interconnection model</Term>
			 <Definition>Worldwide network communications standard developed by the International Organization for Standardization, or ISO, which conceptualizes a 7-layer approach for connecting dissimilar systems with a set of standards, or protocols, allowing the systems to work together</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>OS</Term>
			 <Definition>Operating system</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>OSI</Term>
			 <Definition>See Open Systems Interconnection Model</Definition>
			<Source></Source> 
		</Entry>
	</Section>
	<Section Letter="P">
		<Entry>
			 <Term>packet</Term>
			 <Definition>Smallest building blocks of information on networks, which consist of header fields and data, or payload.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>PAT</Term>
			 <Definition>Port Address Translation is an extension of NAT that permits multiple devices to be located behind and mapped to a single public IP address by translating both the IP address and associated port.  Also called one-to-many NAT.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>patching</Term>
			 <Definition>Application of software and or firmware updates that correct coding errors and bugs.  The most common types of patches are those that correct security vulnerabilities.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>payload</Term>
			 <Definition>Actual data contained in a packet or datagram. Also see header.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Payload Length</Term>
			 <Definition>IPv6 packet header field that specifies the length of the packet’s data or payload.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>PC</Term>
			 <Definition>personal computer</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>phishing</Term>
			 <Definition>Deceiving individuals into disclosing sensitive personal information through deceptive computer-based means.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>phone home</Term>
			 <Definition>A term used to define the process of a bot on an infected machine communicating back to a bot master with information or for further instruction.</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>PHP</Term>
			 <Definition>Hypertext Preprocessor</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>pivoting</Term>
			 <Definition>Technique for using an initial foothold on a network to further compromise the network</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>plaintext</Term>
			 <Definition>Unencrypted information.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>POP</Term>
			 <Definition>Post Office Protocol</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>port aggregator</Term>
			 <Definition>A network tapping methodology that allows multiple traffic streams to be monitored by a single device.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>port number</Term>
			 <Definition>Identifies the application or service to be used for receiving the data packet. Also see Ephemeral and Well Known ports.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>preprocessor</Term>
			 <Definition>Software that processes packet data before the data is actually passed through security signatures for reassembly. See also Frag3 preprocessor.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>promiscuous sniffing</Term>
			 <Definition>Method to sniff network traffic where the network interface cards is set to promiscuous mode and intercepts all packets on the network, not just those destined for that host.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>protocol</Term>
			 <Definition>Set of rules and formats, semantic and syntactic, permitting information systems to exchange information</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>protocol-based IDS method</Term>
			 <Definition>Detection method that analyzes the protocol activity against standard protocol behaviors (other methods include anomaly-based and signature-based)</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
	</Section>
	<Section Letter="R">
		<Entry>
			 <Term>Remote Desktop</Term>
			 <Definition>Remote desktop is a session virtualization capability that allows users access to remote computers using the Remote Desktop Protocol.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>RFC</Term>
			 <Definition>Request for Comments</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>RFC 1918</Term>
			 <Definition>In RFC 1918, the Internet Engineering Task Force (IETF) directed the Internet Assigned Numbers Authority (IANA) to reserve three blocks or ranges of IPv4 addresses for private networks. </Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>RFC 1918 addresses</Term>
			 <Definition>Non-publicly routable IP address space to be used on private networks, which means that these addresses are for internal use only and are not routed on the Internet. </Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>RFI</Term>
			 <Definition>Remote File Inclusion</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>rootkit</Term>
			 <Definition>A set of tools used by an attacker after gaining root-level access to a host to conceal the attacker’s activities on the host and permit the attacker to maintain root-level access to the host through covert means.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>RPC</Term>
			 <Definition>remote procedure call</Definition>
			<Source></Source> 
		</Entry>
	</Section>
	<Section Letter="S">
		<Entry>
			 <Term>Sasser</Term>
			 <Definition>NetBIOS-based worm. See also Nimda.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>script kiddie</Term>
			 <Definition>Inexperienced hackers who use pre-packaged tools for breaking into systems </Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>services</Term>
			 <Definition>Processes or groups of tasks that provide basic functionality and support for other programs. E-mail, file transfer, routing, and so on are examples of services.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>SharePoint Portal Server</Term>
			 <Definition>Microsoft SharePoint Server works with Microsoft IIS web server to produce sites intended for collaboration, file sharing, web databases, social networking and web publishing. </Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>signature</Term>
			 <Definition>Recognizable, distinguishing pattern. See also attack signature.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>signature-based IDS method</Term>
			 <Definition>Detection method that looks for specific patterns of an attack in the network traffic  (other methods include protocol-based and anomaly-based)</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>SMB</Term>
			 <Definition>Server Message Block</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>SMTP</Term>
			 <Definition>Simple Mail Transfer Protocol</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>SNMP</Term>
			 <Definition>Simple Network Management Protocol</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>SNORT</Term>
			 <Definition>A free, open source network intrusion detection and prevention system</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>socket</Term>
			 <Definition>Combination of an IP address and port number into a single expression (also called a network socket)</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>socket pair</Term>
			 <Definition>A source IP address and source port, and a destination IP address and a destination port, which describe a unique connection on a network</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Source Address</Term>
			 <Definition>Provides the IP address of the original sender.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>SPA</Term>
			 <Definition>Switched Port Analyzer</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>SPAN port</Term>
			 <Definition>Term used for port mirroring on Cisco switches</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>SQL</Term>
			 <Definition>Structured Query Language</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>SSG</Term>
			 <Definition>Secure Services Gateway</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>SSH</Term>
			 <Definition>Secure Shell</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>SYN</Term>
			 <Definition>synchronize packet sent  by a client to a server on port 80 as a request to synchronize</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>SYN/ACK</Term>
			 <Definition>Synchronize - Acknowledge.  Two of the flags that can be set in a TCP/IP packet header.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>synchronize/acknowledge</Term>
			 <Definition>Part of the three-way handshake that establishes connections within the TCP/IP protocol stack.  The server acknowledges the client's "SYN" packet and then sends it's own "SYN" packet back to the client.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Systems Center Configuration Manager</Term>
			 <Definition>Systems Center Configuration Manager is systems management software that provides remote control, patch management, software distribution, operating system deployment, network access protection, and hardware and software inventory.  Formerly known as Systems Management Server, or SMS.</Definition>
			<Source></Source> 
		</Entry>
	</Section>
	<Section Letter="T">
		<Entry>
			 <Term>TAPS</Term>
			 <Definition>Test Access Ports</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>TCP</Term>
			 <Definition>Transmission Control Protocol</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>TCP/IP</Term>
			 <Definition>Transmission Control Protocol/Internet Protocol is the underlying protocol of the Internet, developed by a DoD agency called Defense Advanced Research Projects Agency (DARPA). Also refers to a model of interoperability that conceptualizes a 4-layer framework for connecting dissimilar systems with a set of standards, or protocols, allowing the systems to work together. Also see Open Systems Interconnection model.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>TCP/IP Print Service</Term>
			 <Definition>The TCP/IP Printing Service, also called Unix Printing, integrates print services for Windows based machines into Unix environments.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>TCP/UDP</Term>
			 <Definition>Transmission Control Protocol/User Datagram Protocol</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Telnet</Term>
			 <Definition>Terminal Emulation Over a Network</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>TFTP</Term>
			 <Definition>Trivial File Transport Protocol</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Total Length</Term>
			 <Definition>Packet header field that identifies the entire datagram size, including header and data. The minimum datagram length is 20 bytes, and the maximum is 65,535.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Traffic Class</Term>
			 <Definition>IPv6 header field that differentiates packets according to priority (also called Packet Priority field).</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>trojan horse</Term>
			 <Definition>A computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>true-negative IDS event</Term>
			 <Definition>Refers to a non-malicious activity for which the IDS does not provide an alert</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>true-positive IDS event</Term>
			 <Definition>Refers to malicious traffic or traffic of interest that has occurred, and for which the IDS provides an alert for further examination</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>trusted networks</Term>
			 <Definition>A network that with appropriate technical, administrative, and physical access controls to assume a certain level of security and trust</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>TTL</Term>
			 <Definition>The Time to Live field may also be referred to as a hop count. It tracks the datagram’s length of life, or the number of times the packet can hop, or be forwarded, from router to router. The value in this field can prevent the packet from endlessly traversing a network.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>tunneling</Term>
			 <Definition>Technology enabling one network to send its data via another network’s connections. Tunneling works by encapsulating a network protocol within packets carried by the second network.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Type of Service</Term>
			 <Definition>Packet header field that specifies how to prioritize information on its way to its destination, for example, with a preference for low delay or high reliability. </Definition>
			<Source></Source> 
		</Entry>
	</Section>
	<Section Letter="U">
		<Entry>
			 <Term>Ubuntu</Term>
			 <Definition>A free, open source Debian-based Linux distribution</Definition>
			<Source></Source> 
		</Entry>	
		<Entry>
			 <Term>UDP</Term>
			 <Definition>User Datagram Protocol</Definition>
			<Source>CNSS 4009</Source> 
		</Entry>
		<Entry>
			 <Term>undecillion</Term>
			 <Definition>Number representing 10 to the 36th power (1e 36)</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>unicast</Term>
			 <Definition>Transmissions sent to a single network destination identified by a unique address. </Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>untrusted networks</Term>
			 <Definition>These techniques include, but are not limited to, disabling unnecessary services; preventing use of unsecure services; up-to-date patching; and strong password policies.   </Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>URL</Term>
			 <Definition>Uniform Resource Locator</Definition>
			<Source></Source> 
		</Entry>
	</Section>
	<Section Letter="V">
		<Entry>
			 <Term>Version</Term>
			 <Definition>Packet header field that contains the version number of the protocol.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>VoIP</Term>
			 <Definition>Voice over Internet Protocol</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>VPN</Term>
			 <Definition>Virtual Private Network</Definition>
			<Source></Source> 
		</Entry>
	</Section>
	<Section Letter="W">
		<Entry>
			 <Term>Well Known ports</Term>
			 <Definition>Ports reserved for system and/or root processes and applications with the required privileges. Also see Ephemeral ports.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>whois</Term>
			 <Definition>A TCP/IP protocol used to provide information services to users.  Traditionally the whois protocol is leveraged for domain name and IP address lookups querying databases containing this information.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>Windows Internet Name Service (WINS)</Term>
			 <Definition>Windows Internet Name Service is a Microsoft implementation of NetBIOS that provides mapping of client names to IP addresses as assigned by a DHCP server.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>worm</Term>
			 <Definition>A self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself. See malicious code.</Definition>
			<Source></Source> 
		</Entry>
		<Entry>
			 <Term>WWW</Term>
			 <Definition>World Wide Web</Definition>
			<Source></Source> 
		</Entry>
	</Section>
	<Section Letter="Z">
		<Entry>
			 <Term>Zenmap</Term>
			 <Definition>Open source GUI application aimed at creating an easy to use interface for the traditionally command-line based Nmap utility</Definition>
			<Source></Source> 
		</Entry>
	</Section>
</Glossary>
