﻿<Glossary>
	<Section Letter="A">
	   <Entry>
		<Term>addr</Term>
		<Definition>address</Definition>
	   </Entry>
	   <Entry>
		<Term>anomaly-based IDS method</Term>
		<Definition>Detection method that looks for traffic activity that falls outside of normal traffic patterns (other methods include signature-based and protocol-based)</Definition>
	   </Entry>
	   <Entry>
		<Term>API</Term>
		<Definition>Application Programming Interface is an interface that allows software programs to interact with each other.</Definition>
	   </Entry>
	   <Entry>
		<Term>ARP</Term>
		<Definition>Address Resolution Protocol</Definition>
	   </Entry>
	   <Entry>
		<Term>ASCII</Term>
		<Definition>American Standard Code for Information Interchange </Definition>
	   </Entry>
	   <Entry>
		<Term>attack signature</Term>
		<Definition>A characteristic byte pattern used in malicious code or an indicator, or set of indicators that allows the identification of malicious network activities.</Definition>
	   </Entry>	
	</Section>
	<Section Letter="B">
	   <Entry>
		<Term>Backdoor Program</Term>
		<Definition>A backdoor program is a means to access or maintain access to an application or system that bypasses security controls.</Definition>
	   </Entry>
	   <Entry>
		<Term>BHO</Term>
		<Definition>A BHO is a plug-in that runs automatically every time you start your Internet browser. A  BHO can do almost anything, but generally, it will have something to do with &quot;helping&quot; you browse the Internet. Toolbars are a common kind of BHO.</Definition>
	   </Entry>
	   <Entry>
		<Term>Boolean Operators</Term>
		<Definition>Boolean operators are used widely in programming and also in forming database queries. They are logical connectives, like a symbol or word, used to connect two or more entries for search purposes. </Definition>
	   </Entry>
	   <Entry>
		<Term>bot</Term>
		<Definition>Refers to malicious code that is installed on a computer to take command and control of the computer for the attacker’s own purposes. The controlled computer becomes a zombie, or member of a botnet, which can be used to steal data, host malicious content, and launch other attacks, including worms and viruses, to send spam. Also see botnet.</Definition>
	   </Entry>
	   <Entry>
		<Term>botherder</Term>
		<Definition>Someone who covertly and illegally controls a network (or botnet) of zombie computers or devices by sending commands to a server. </Definition>
	   </Entry>
	   <Entry>
		<Term>botnet</Term>
		<Definition>Collection of bots controlled by a bot herder. Also see bot.</Definition>
	   </Entry>
	   <Entry>
		<Term>BPF</Term>
		<Definition>Berkeley Packet Filter (BPF) expressions specify the types of packets you want to captures on layer two through four header fields. See primititve.</Definition>
	   </Entry>
	</Section>
	<Section Letter="C">
	   <Entry>
		<Term>C2</Term>
		<Definition>command and control</Definition>
	   </Entry>
	   <Entry>
		<Term>CLI</Term>
		<Definition>command-line interface</Definition>
	   </Entry>
	   <Entry>
		<Term>Codec</Term>
		<Definition>Codec is coder-decoder software that compresses (encodes) and decompresses (decode) data, most commonly digital media.</Definition>
	   </Entry>
	   <Entry>
		<Term>Code Injection</Term>
		<Definition>Code injection in the insertion of custom code, typically malicious, directly into a program, script, or application to be rendered or processed by that application as a method to exploit the victim machine.</Definition>
	   </Entry>
	   <Entry>
		<Term>Computer Browser (NetBIOS)</Term>
		<Definition>Computer Browser service is the mechanism that collects and distributes the list of workgroups and domains and the servers within them.  It provides backward compatibility with computers running earlier versions of Windows that must use NetBIOS over TCP/IP and are not Active Directory–capable.</Definition>
	   </Entry>
	   <Entry>
		<Term>Command Line Options</Term>
		<Definition>Packet header field that determines whether routers are allowed to fragment a packet into segments. If fragmentation is allowed, then this field also identifies parts of the packet for the receiver. Also called flags. </Definition>
	   </Entry>
	   <Entry>
		<Term>Coreflood</Term>
		<Definition>From 2001 to 2011, the Coreflood Trojan infected computers running the Windows operating system. It attempted to steal personal data such as banking passwords in an effort to steal money.</Definition>
	   </Entry>
	</Section>
	<Section Letter="D">		
	   <Entry>
		<Term>Destination Address</Term>
		<Definition>Provides the IP address of the intended receiver.</Definition>
	   </Entry>
	   <Entry>
		<Term>Dirty Word List</Term>
		<Definition>A dirty word list is a forensic term describing a list of content a forensic investigator believes is related to a case.</Definition>
	   </Entry>
	   <Entry>
		<Term>DLL</Term>
		<Definition>Dynamic Link Library</Definition>
	   </Entry>
	   <Entry>
		<Term>DMZ</Term>
		<Definition>Demilitarized Zone is a perimeter network segment that is logically between internal and external networks. Its purpose is to enforce the internal network’s Information Assurance policy for external information exchange and to provide external, untrusted sources with restricted access to releasable information while shielding the internal networks from outside attacks.</Definition>
		<Source>CNSS 4009</Source>
	   </Entry>
	   <Entry>
		<Term>DNS</Term>
		<Definition>Domain Name System</Definition>
	   </Entry>
	   <Entry>
		<Term>DoD</Term>
		<Definition>Department of Defense</Definition>
	   </Entry>
	   <Entry>
		<Term>DOS</Term>
		<Definition>Disk Operating System</Definition>
	   </Entry>
	   <Entry>
		<Term>DSL</Term>
		<Definition>Digital subscriber line</Definition>
	   </Entry>
	   <Entry>
		<Term>dst</Term>
		<Definition>destination</Definition>
	   </Entry>
	</Section>
	<Section Letter="E">		
	   <Entry>
		<Term>Ephemeral ports</Term>
		<Definition>Ports that are reserved for temporary use by the client end of client-server communications. Also see Well Known ports.</Definition>
	   </Entry>
	   <Entry>
		<Term>eq</Term>
		<Definition>The equivalent to the double equal sign</Definition>
	   </Entry>
	   <Entry>
		<Term>Exchange Server/Client:</Term>
		<Definition>The port list includes a conglomeration of ports and services utilized by Microsoft Exchange for the sending and receiving of email messages.</Definition>
	   </Entry>
	   <Entry>
		<Term>EXE</Term>
	   <Definition>&quot;exe&quot; is a filename extension denoting an executable file. It is most commonly identified with Microsoft based systems.</Definition>
	   </Entry>
	</Section>
	<Section Letter="F">
	   <Entry>
		<Term>Flags</Term>
		<Definition>Packet header field that determines whether routers are allowed to fragment a packet into segments. If fragmentation is allowed, then this field also identifies parts of the packet for the receiver. Also called command line options. </Definition>
	   </Entry>
	   <Entry>
		<Term>FTP</Term>
		<Definition>File Transfer Protocol</Definition>
	   </Entry>
	   <Entry>
		<Term>File Format Attack</Term>
		<Definition>File format attacks exploit the integrity of a file, and occur when the structure of a file is modified with the intent of adding malicious code.</Definition>
	   </Entry>
	</Section>
	<Section Letter="G">	
	   <Entry>
		<Term>GetProcAddress</Term>
		<Definition>Retrieves the address of an exported function or variable from the specified dynamic-link library (DLL).</Definition>
	   </Entry>
	   <Entry>
		<Term>GUI</Term>
		<Definition>Graphical User Interface</Definition>
	   </Entry>
	   <Entry>
		<Term>GUID</Term>
		<Definition>Globally Unique Identifier</Definition>
	   </Entry>
	</Section>
	<Section Letter="H">	
	   <Entry>
		<Term>hacker</Term>
		<Definition>Unauthorized user who attempts to or gains access to an information system </Definition>
		<Source>CNSS 4009</Source>
	   </Entry>
	   <Entry>
		<Term>header</Term>
		<Definition>Portion of a data packet or datagram that contains identifying information such as the IP version number and the source and destination addresses.</Definition>
	   </Entry>
	   <Entry>
		<Term>HIDS</Term>
		<Definition>Host-based Intrusion Detection System. See Host-based IDS.</Definition>
		<Source>CNSS 4009</Source>
	   </Entry>
	   <Entry>
		<Term>host</Term>
		<Definition>The word &quot;host&quot; followed by an IP address is a primitive that instructs a sniffer to look for packets with that source or destination IP address</Definition>
	   </Entry>
	   <Entry>
		<Term>Host-based IDS</Term>
		<Definition>IDS that operates on information collected from within an individual computer system. This vantage point allows host-based IDSes to determine exactly which processes and user accounts are involved in a particular attack on the Operating System. Furthermore, unlike network-based IDSes, host-based IDSes can more readily &quot;see&quot; the intended outcome of an attempted attack, because they can directly access and monitor the data files and system processes usually targeted by attacks.</Definition>
		<Source>CNSS 4009</Source>
	   </Entry>
	   <Entry>
		<Term>HTTP</Term>
		<Definition>Hypertext Transfer Protocol</Definition>
	   </Entry>
	   <Entry>
		<Term>HTTPS</Term>
		<Definition>Hypertext Transfer Protocol Secure</Definition>
	   </Entry>
	</Section>
	<Section Letter="I">	
	   <Entry>
		<Term>ID</Term>
		<Definition>identification</Definition>
	   </Entry>
	   <Entry>
		<Term>ICMP</Term>
		<Definition>Internet Control Message Protocol</Definition>
	   </Entry>
	   <Entry>
		<Term>IDS</Term>
		<Definition>Intrusion Detection System. See Intrusion Detection System.</Definition>
		<Source>CNSS 4009</Source>
	   </Entry>
	   <Entry>
		<Term>Internet</Term>
		<Definition>The Internet is the single, interconnected, worldwide system of commercial, governmental, educational, and other computer networks that share (a) the protocol suite specified by the IAB and (b) the name and address spaces managed by the Internet Corporation for Assigned Names and Numbers (ICANN).</Definition>
		<Source>CNSS 4009</Source>
	   </Entry>
	   <Entry>
		<Term>Internet Information Service</Term>
		<Definition>Microsoft-developed web server.</Definition>
	   </Entry>
	   <Entry>
		<Term>intrusion</Term>
		<Definition>Unauthorized act of bypassing the security mechanisms of a system</Definition>
		<Source>CNSS 4009</Source>
	   </Entry>
	   <Entry>
		<Term>Intrusion Detection System</Term>
		<Definition>Hardware or software products that gather and analyze information from various areas within a computer or a network to identify possible security breaches, which include both intrusions (attacks from outside the organizations) and misuse (attacks from with the organizations)</Definition>
		<Source>CNSS 4009</Source>
	   </Entry>
	   <Entry>
		<Term>IP</Term>
		<Definition>Internet Protocol is a standard protocol for transmission of data from source to destinations in packet-switched communications networks and interconnected systems of such networks</Definition>
		<Source>CNSS 4009</Source>
	   </Entry>
	   <Entry>
		<Term>IPv4</Term>
		<Definition>Internet Protocol version 4</Definition>
	   </Entry>
	   <Entry>
		<Term>IPv6</Term>
		<Definition>Internet Protocol version 6</Definition>
	   </Entry>
	   <Entry>
		<Term>IPX</Term>
		<Definition>Internetwork Packet Exchange</Definition>
	   </Entry>
	   <Entry>
		<Term>IRC</Term>
		<Definition>Internet Relay Chat is a multi-user multi-channel chat system that is neither client nor network specific.</Definition>
	   </Entry>
	   <Entry>
		<Term>ISP</Term>
		<Definition>Internet service provider</Definition>
	   </Entry>
	</Section>
	<Section Letter="J">	
	   <Entry>
		<Term>JOIN</Term>
		<Definition>Join command</Definition>
	   </Entry>
	</Section>
	<Section Letter="K">
	   <Entry>
		<Term>kernel</Term>
		<Definition>The central module of an operating system. It is the part of the operating system that loads first, and it remains in main memory. Because it stays in memory, it is important for the kernel to be as small as possible while still providing all the essential services required by other parts of the operating system and applications. Typically, the kernel is responsible for memory management, process and task management, and disk management. </Definition>
	   </Entry>
	   <Entry>
		<Term>Keylogger</Term>
		<Definition>A keylogger is a hardware device or software designed to capture keystrokes input by the user on the keyboard.</Definition>
	   </Entry>	
	</Section>
	<Section Letter="L">	
	   <Entry>
		<Term>LAN</Term>
		<Definition>local area network</Definition>
	   </Entry>
	   <Entry>
		<Term>Leverage Social Networking</Term>
		<Definition>Where attackers leverage these trust relationships built on social networks and the relatively open nature of social networking sites to target victims. The targeting can take many forms, but is often accomplished by exploiting an individual trusted by the victim or trying to establish a trust relationship with the victim directly.</Definition>
	   </Entry>
	   <Entry>
		<Term>libpcap</Term>
		<Definition>Libpcap is a portable C/C++ packet capture (pcap) library that provides the framework for reading and writing data in a standard format for tcpdump. It is used with UNIX-like platforms.</Definition>
	   </Entry>
	   <Entry>
		<Term>Linux</Term>
		<Definition>A family of operating systems similar to UNIX but composed of open source tools, resources, and software.</Definition>
	   </Entry>
	   <Entry>
		<Term>Load Library</Term>
		<Definition>The LoadLibrary API is useful for executing malicious code, injecting malicious code into DLLs, and providing access to DLLs.</Definition>
	   </Entry>
	   <Entry>
		<Term>Logical Operators</Term>
		<Definition>Primitives can be combined with the logical operators "and" "not" and "or" to add another layer of filtering.</Definition>
	   </Entry>
	</Section>
	<Section Letter="M">	
	   <Entry>
		<Term>MAC address</Term>
		<Definition>Media Access Control address - the unique identifier for each network assigned to network interface cards by the manufacturer.</Definition>
		<Source>CNSS 4009</Source>
	   </Entry>
	   <Entry>
		<Term>Mariposa</Term>
		<Definition>The Mariposa botnet was created using the Butterfly bot. The botnet infiltrated about 13 million personal, government, and corporate systems in 190 countries before it was dismantled in December 2009. </Definition>
	   </Entry>
	</Section>
	<Section Letter="N">
	   <Entry>
		<Term>network</Term>
		<Definition>Information system(s) implemented with a collection of interconnected components. Such components may include routers, hubs, cabling, telecommunications controllers, key distribution centers, and technical control devices.</Definition>
		<Source>CNSS 4009</Source>
	   </Entry>
	   <Entry>
		<Term>Network-based Intrusion Detection System</Term>
		<Definition>IDS that detects attacks by capturing and analyzing network packets. Listening on a network segment or switch, one network-based IDS can monitor the network traffic affecting multiple hosts that are connected to the network segment.</Definition>
		<Source>CNSS 4009</Source>
	   </Entry>
	   <Entry>
		<Term>NIDS</Term>
		<Definition>Network intrusion detection system</Definition>
	   </Entry>
	</Section>
	<Section Letter="O">
	   <Entry>
		<Term>Open Source</Term>
		<Definition>Readily available and free</Definition>
	   </Entry>
	   <Entry>
		<Term>Open Systems Interconnection (OSI) model</Term>
		<Definition>Worldwide network communications standard developed by the International Organization for Standardization, or ISO, which conceptualizes a 7-layer approach for connecting dissimilar systems with a set of standards, or protocols, allowing the systems to work together</Definition>
	   </Entry>
	   <Entry>
		<Term>OS</Term>
		<Definition>Operating system</Definition>
	   </Entry>
	   <Entry>
		<Term>OSI</Term>
		<Definition>See Open Systems Interconnection model</Definition>
	   </Entry>
	   <Entry>
		<Term>Outside-in security model</Term>
		<Definition>Security model that uses defenses like firewalls and server hardening in the belief that attacks begin from external actors. The focus is to prevent malicious activity from penetrating the security perimeter and getting inside the network. Not good at defending against malicious client-side activities that result from internal outbound traffic. </Definition>
	   </Entry>
	</Section>
	<Section Letter="P">
	   <Entry>
		<Term>packet</Term>
		<Definition>Smallest building blocks of information on networks, which consist of header fields and data, or payload.</Definition>
	   </Entry>
	   <Entry>
		<Term>patch</Term>
		<Definition>A patch is a an update to programs and plug-ins to close vulnerabilities before they can be exploited. It's difficult to achieve 100% patch coverage, but missing even one patch could compromise the client machine and assests on the network. </Definition>
	   </Entry>
	   <Entry>
		<Term>PC</Term>
		<Definition>personal computer</Definition>
	   </Entry>
	   <Entry>
		<Term>pcap</Term>
		<Definition>Packet capture. A raw packet is a packet that is left in its original, unmodified form as it traveled across the network from client to server.</Definition>
	   </Entry>
	   <Entry>
		<Term>PDF</Term>
		<Definition>Portable Document Format; most commonly associated with Adobe Acrobat</Definition>
	   </Entry>
	   <Entry>
		<Term>Pivot</Term>
		<Definition>Pivoting is a technique attackers use to further compromise the network after gaining an initial foothold via one compromised system on that network.</Definition>
	   </Entry>
	   <Entry>
		<Term>port traffic</Term>
		<Definition>Traffic going to or coming from a specific port.</Definition>
	   </Entry>
	   <Entry>
		<Term>primitive</Term>
		<Definition>A primitive is a shortcut used in Berekely Packet Filter (BPF) expression to specifying the desired contents of headers you want a sniffer to search for.</Definition>
	   </Entry>
	   <Entry>
		<Term>promiscuous sniffing</Term>
		<Definition>Method to sniff network traffic where the network interface cards is set to promiscuous mode and intercepts all packets on the network, not just those destined for that host.</Definition>
	   </Entry>
	   <Entry>
		<Term>promiscuous mode</Term>
		<Definition>Capturing packets using promiscuous mode will capture all traffic arriving at the network interface and requires administrator or root level privileges.</Definition>
	   </Entry>
	   <Entry>
		<Term>protocol</Term>
		<Definition>Set of rules and formats, semantic and syntactic, permitting information systems to exchange information</Definition>
	   </Entry>
	   <Entry>
		<Term>protocol-based IDS method</Term>
		<Definition>Detection method that analyzes the protocol activity against standard protocol behaviors (other methods include anomaly-based and signature-based)</Definition>
		<Source>CNSS 4009</Source>
	   </Entry>
	</Section>
	<Section Letter="R">
	   <Entry>
		<Term>rootkit</Term>
		<Definition>A set of tools used by an attacker after gaining root-level access to a host to conceal the attacker’s activities on the host and permit the attacker to maintain root-level access to the host through covert means.</Definition>
	   </Entry>
	   <Entry>
		<Term>RPC</Term>
		<Definition>remote procedure call</Definition>
	   </Entry>
	</Section>
	<Section Letter="S">
	   <Entry>
		<Term>SEO</Term>
		<Definition>Search Engine Optimization is a collection of techniques used to achieve higher search rankings for a given website. </Definition>
	   </Entry>
	   <Entry>
		<Term>signature</Term>
		<Definition>Recognizable, distinguishing pattern. See also attack signature.</Definition>
	   </Entry>
	   <Entry>
		<Term>signature-based IDS method</Term>
		<Definition>Detection method that looks for specific patterns of an attack in the network traffic  (other methods include signature-based and anomaly-based)</Definition>
		<Source>CNSS 4009</Source>
	   </Entry>
	   <Entry>
		<Term>SMS</Term>
		<Definition>Short Message Service</Definition>
	   </Entry>
	   <Entry>
		<Term>SMTP</Term>
		<Definition>Simple Mail Transfer Protocol</Definition>
	   </Entry>
	   <Entry>
		<Term>Snort</Term>
		<Definition>A free, open source network intrusion detection and prevention system.</Definition>
	   </Entry>
	   <Entry>
		<Term>Social engineering</Term>
		<Definition>Social engineering is an attempt to trick someone into revealing information (e.g., a password) that can be used to attack an enterprise.</Definition>
	   </Entry>
	   <Entry>
		<Term>Source Address</Term>
		<Definition>Provides the IP address of the original sender.</Definition>
	   </Entry>
	   <Entry>
		<Term>src</Term>
		<Definition>source</Definition>
	   </Entry>
	   <Entry>
		<Term>SSH</Term>
		<Definition>Secure Shell</Definition>
	   </Entry>
	   <Entry>
		<Term>Sniffers</Term>
		<Definition>A sniffer is a tool that listens to or &quot;sniffs&quot; the traffic traveling between networked devices. It is also called a packet analyzer or protocol analyzer.</Definition>
	   </Entry>
	   <Entry>
		<Term>Stage 2 Executable</Term>
		<Definition>The Stage 2 or second stage download occurs after the initial compromise. The initial compromise typically yields code execution capability and then downloads the second stage, which provides more robust and malicious capabilities.</Definition>
	   </Entry>
	   <Entry>
		<Term>Storm Worm</Term>
		<Definition>A worm that infected 1-10 million computers creating the Storm botnet. It was unique in that it used a combination of vectors (exploits, OS kernel attacks, email links about current disasters) to attack computers. </Definition>
	   </Entry>
	   <Entry>
		<Term>Strings</Term>
		<Definition>Strings is a tool you can use during a first pass analysis of packet data. This tool searches binary pcap files looking for ASCII printable characters. Example: strings -n 8 file1.pcap</Definition>
	   </Entry>
	</Section>
	<Section Letter="T">
	   <Entry>
		<Term>TCP</Term>
		<Definition>Transmission Control Protocol</Definition>
	   </Entry>
	   <Entry>
		<Term>tcpdump</Term>
		<Definition>Tcpdump is an open source command-line packet analyzer for Linux and UNIX systems. </Definition>
	   </Entry>
	   <Entry>
		<Term>TCP/IP</Term>
		<Definition>Transmission Control Protocol/Internet Protocol is the underlying protocol of the Internet, developed by a DoD agency called Defense Advanced Research Projects Agency (DARPA). Also refers to a model of interoperability that conceptualizes a 4-layer framework for connecting dissimilar systems with a set of standards, or protocols, allowing the systems to work together. Also see Open Systems Interconnection model.</Definition>
	   </Entry>
	   <Entry>
		<Term>TCP/UDP</Term>
		<Definition>Transmission Control Protocol/User Datagram Protocol</Definition>
	   </Entry>
	   <Entry>
		<Term>TDL-4</Term>
		<Definition>TDL-4 is a fourth generation variant of the TDSS rootkit (discovered in 2008). It can infect both 32-bit and 64-bit operating systems. TDL-4 encrypts communications between the botnet command and control centers and the infected computers. </Definition>
	   </Entry>
	   <Entry>
		<Term>TFTP</Term>
		<Definition>Trivial File Transport Protocol </Definition>
	   </Entry>
	   <Entry>
		<Term>TShark</Term>
		<Definition>TShark is the command-line version of Wireshark. It uses the packet capture filtering mechanism of tcpdump and has some of the analysis capabilities of Wireshark.</Definition>
	   </Entry>
	</Section>
	<Section Letter="U">
	   <Entry>
		<Term>UDP</Term>
		<Definition>User Datagram Protocol</Definition>
		<Source>CNSS 4009</Source>
	   </Entry>
	   <Entry>
		<Term>untrusted networks</Term>
		<Definition>These techniques include, but are not limited to, disabling unnecessary services; preventing use of unsecure services; up-to-date patching; and strong password policies.   </Definition>
	   </Entry>
	   <Entry>
		<Term>URL</Term>
		<Definition>Uniform Resource Locator</Definition>
	   </Entry>
	   <Entry>
		<Term>USB</Term>
		<Definition>Uniform Serial Bus</Definition>
	   </Entry>
	</Section>
	<Section Letter="V">
	   <Entry>
		<Term>VBA</Term>
		<Definition>Visual Basic for Applications</Definition>
	   </Entry>
	   <Entry>
		<Term>VBScript</Term>
		<Definition>Visual Basic Scripting Edition</Definition>
	   </Entry>
	   <Entry>
		<Term>Vector</Term>
		<Definition>Method or paths used to deliver malicious code. Such as email, attachments, downloaded files, etc. </Definition>
	   </Entry>
	   <Entry>
		<Term>VoIP</Term>
		<Definition>Voice over IP</Definition>
	   </Entry>
	</Section>
	<Section Letter="W">
	   <Entry>
		<Term>WinDump</Term>
		<Definition>WinDump is an open source command-line packet analyzer for Windows environments.</Definition>
	   </Entry>
	   <Entry>
		<Term>WinPcap</Term>
		<Definition>WinPcap provides the framework for reading and writing data in a standard format for WinDump. It is based on the libpcap model and Berkeley Packet Filters (BPFs) for UNIX and runs on Win32 and Win64 platforms. </Definition>
	   </Entry>
	   <Entry>
		<Term>Wireshark</Term>
		<Definition>Wireshark is a free complex protocol analyzer that uses a graphical user interface (GUI) to display analysis results. It can identify header fields for intrusion detection and analyze data payload. It was formerly known as Ethereal.</Definition>
	   </Entry>
	   <Entry>
		<Term>Whitelisting</Term>
		<Definition>Whitelisting is a technique that allows domains from trusted to untrusted networks or applications and file-types permitted to run on a system.</Definition>
	   </Entry>
	   <Entry>
		<Term>WWW</Term>
		<Definition>World Wide Web</Definition>
	   </Entry>
	</Section>
	<Section Letter="X">
	   <Entry>
		<Term>XSS</Term>
		<Definition>Cross-site scripting, or XSS, attacks insert or modify scripts, such as JavaScript, HTML, Flash, ActiveX, or VBScript, that are embedded on a web page and are executed on the client-side, in the user’s browser.</Definition>
	   </Entry>
	</Section>
	<Section Letter="Z">
	   <Entry>
		<Term>Zombie</Term>
		<Definition>An individual computer, smartphone, or device controlled by someone running a botnet. See also bot. </Definition>
	   </Entry>
	</Section>
</Glossary>
