﻿<Glossary>
	<Section Letter="A">
	<Entry>
        <Term>$HOME_NET</Term>
        <Definition>Snort variable defined in the snort.conf file used to define those networks you are trying to protect.</Definition>
    </Entry>
    <Entry>
        <Term>$EXTERNAL_NET</Term>
        <Definition>Snort variable defined in the snort.conf file used to define networks that fall into categories such as those you are defending against or those networks that do not fall under your control.</Definition>
    </Entry>
    <Entry>
        <Term>Access Control List (ACL)</Term>
        <Definition>Defines access rights to networks, systems, or system objects.</Definition>
    </Entry>
    <Entry>
        <Term>addr</Term>
        <Definition>address</Definition>
    </Entry>
    <Entry>
        <Term>adversary</Term>
        <Definition>In the context of this course, an adversary is an individual, group, or nation state that perpetrates malicious cyber events in the interest of cybercrime, espionage, or vandalism. See also "hacker," "malicious actor," and "threat actor."</Definition>
    </Entry>
    <Entry>
        <Term>alert (Snort rule action)</Term>
        <Definition>Tells Snort to generate an alert and log the packet</Definition>
    </Entry>
    <Entry>
        <Term>alert data</Term>
        <Definition>Data from some alert driven source that has triggered on a specific set of circumstances. Typically from an IDS.</Definition>
    </Entry>
    <Entry>
        <Term>anomaly-based IDS method</Term>
        <Definition>Detection method that looks for traffic activity that falls outside of normal traffic patterns (other methods include signature-based and protocol-based)</Definition>
    </Entry>
    <Entry>
        <Term>Application Programming Interface (API)</Term>
        <Definition>An interface that allows software programs to interact with each other.</Definition>
    </Entry>
    <Entry>
        <Term>ARP</Term>
        <Definition>Address Resolution Protocol</Definition>
    </Entry>
    <Entry>
        <Term>ASCII</Term>
        <Definition>American Standard Code for Information Interchange </Definition>
    </Entry>
    <Entry>
        <Term>AS&W</Term>
        <Definition>Attack Sensing & Warning. Sensing of changes in DoD global information system and computer networks to include the detection, correlation, identification, and characterization of a large spectrum of intentional unauthorized activity, including computer intrusion or attack.</Definition>
    </Entry>
    <Entry>
        <Term>attack signature</Term>
        <Definition>A characteristic byte pattern used in malicious code or an indicator, or set of indicators that allows the identification of malicious network activities.</Definition>
    </Entry>
    <Entry>
        <Term>attack vectors </Term>
        <Definition>Method or methods used by a threat actor to facilitate a security incident.</Definition>
    </Entry>
    <Entry>
        <Term>availability </Term>
        <Definition>Ensuring timely and reliable access to and use of information</Definition>
    </Entry>
	</Section>
	<Section Letter="B">
    <Entry>
        <Term>Backdoor Program</Term>
        <Definition>A backdoor program is a means to access or maintain access to an application or system that bypasses security controls.</Definition>
    </Entry>
    <Entry>
        <Term>BHO</Term>
        <Definition>A BHO is a plug-in that runs automatically every time you start your Internet browser. A BHO can do almost anything, but generally, it will have something to do with "helping" you browse the Internet. Toolbars are a common kind of BHO.</Definition>
    </Entry>
    <Entry>
        <Term>Boolean Operators</Term>
        <Definition>Boolean operators are used widely in programming and also in forming database queries. They are logical connectives, like a symbol or word, used to connect two or more entries for search purposes. </Definition>
    </Entry>
    <Entry>
        <Term>bot</Term>
        <Definition>Refers to malicious code that is installed on a computer to take command and control of the computer for the attacker’s own purposes. The controlled computer becomes a zombie, or member of a botnet, which can be used to steal data, host malicious content, and launch other attacks, including worms and viruses, to send spam. Also see botnet.</Definition>
    </Entry>
    <Entry>
        <Term>botherder</Term>
        <Definition>Someone who covertly and illegally controls a network (or botnet) of zombie computers or devices by sending commands to a server. </Definition>
    </Entry>
    <Entry>
        <Term>botnet</Term>
        <Definition>Collection of bots controlled by a bot herder. Also see bot.</Definition>
    </Entry>
    <Entry>
        <Term>BPF</Term>
        <Definition>Berkeley Packet Filter (BPF) expressions specify the types of packets you want to captures on layer two through four header fields. See primititve.</Definition>
    </Entry>
	</Section>
	<Section Letter="C">
    <Entry>
        <Term>C2</Term>
        <Definition>command and control</Definition>
    </Entry>
    <Entry>
        <Term>CIDR</Term>
        <Definition>Classless Inter-Domain Routing. An IP (Internet Protocol) addressing scheme that organizes IP addresses into subnetworks independent of the value of the addresses themselves. CIDR specifies an IP address range using a combination of an IP address and its associated network mask.</Definition>
    </Entry>
    <Entry>
        <Term>classtype (Snort rule option)</Term>
        <Definition>A keyword to categorize a rule as a specific attack type.</Definition>
    </Entry>
    <Entry>
        <Term>CLI</Term>
        <Definition>command-line interface</Definition>
    </Entry>
    <Entry>
        <Term>Codec</Term>
        <Definition>Codec is coder-decoder software that compresses (encodes) and decompresses (decode) data, most commonly digital media.</Definition>
    </Entry>
    <Entry>
        <Term>Code Injection</Term>
        <Definition>Code injection in the insertion of custom code, typically malicious, directly into a program, script, or application to be rendered or processed by that application as a method to exploit the victim machine.</Definition>
    </Entry>
    <Entry>
        <Term>Computer Browser (NetBIOS)</Term>
        <Definition>Computer Browser service is the mechanism that collects and distributes the list of workgroups and domains and the servers within them. It provides backward compatibility with computers running earlier versions of Windows that must use NetBIOS over TCP/IP and are not Active Directory–capable.</Definition>
    </Entry>
    <Entry>
        <Term>Command Line Options</Term>
        <Definition>Packet header field that determines whether routers are allowed to fragment a packet into segments. If fragmentation is allowed, then this field also identifies parts of the packet for the receiver. Also called flags. </Definition>
    </Entry>
    <Entry>
        <Term>Computer Network Defense Infrastructure Support (CND-IS)</Term>
        <Definition>CND-IS personnel test, implement, deploy, maintain, and administer the infrastructure systems which are required to effectively manage the CND-SP network and resources. This may include, but is not limited to routers, firewalls, intrusion detection/prevention systems, and other CND tools as deployed within the NE or enclave</Definition>
    </Entry>
    <Entry>
        <Term>confidentiality </Term>
        <Definition>Preserving authorized restrictions on information access and disclosure, including any means for protecting personal privacy and proprietary information</Definition>
    </Entry>
    <Entry>
        <Term>content (Snort rule option)</Term>
        <Definition>The specific packet payload that Snort rules alert on when a pattern match occurs.</Definition>
    </Entry>
    <Entry>
        <Term>Coreflood</Term>
        <Definition>From 2001 to 2011, the Coreflood Trojan infected computers running the Windows operating system. It attempted to steal personal data such as banking passwords in an effort to steal money.</Definition>
    </Entry>
    <Entry>
        <Term>CND analyst </Term>
        <Definition>Personnel that use data collected from a variety of CND tools (including intrusion detection system alerts, firewall and network traffic logs, and host system logs) to analyze events that occur within their environment.</Definition>
    </Entry>
    <Entry>
        <Term>CNDSP</Term>
        <Definition>Computer Nework Defense Service Provider</Definition>
    </Entry>
    <Entry>
        <Term>C/S/A</Term>
        <Definition>Command/Service/Agency</Definition>
    </Entry>
    <Entry>
        <Term>CYBERCOM </Term>
        <Definition>United States Cyber Command</Definition>
    </Entry>
	</Section>
	<Section Letter="D">
    <Entry>
        <Term>Data Exfiltration</Term>
        <Definition>The unauthorized removal or transfer of data from a computer system.</Definition>
    </Entry>
    <Entry>
        <Term>depth (Snort content modifier)</Term>
        <Definition>Specifies how deep into packets Snort should search for content patterns.</Definition>
    </Entry>
    <Entry>
        <Term>Destination Address</Term>
        <Definition>Provides the IP address of the intended receiver.</Definition>
    </Entry>
    <Entry>
        <Term>Dirty Word List</Term>
        <Definition>A dirty word list is a forensic term describing a list of content a forensic investigator believes is related to a case.</Definition>
    </Entry>
    <Entry>
        <Term>distance (Snort content modifier)</Term>
        <Definition>Tells Snort how many bytes to skip after the previous content match before searching for current content.</Definition>
    </Entry>
    <Entry>
        <Term>DLL</Term>
        <Definition>Dynamic Link Library</Definition>
    </Entry>
    <Entry>
        <Term>DMZ</Term>
        <Definition>Demilitarized Zone is a perimeter network segment that is logically between internal and external networks. Its purpose is to enforce the internal network’s Information Assurance policy for external information exchange and to provide external, untrusted sources with restricted access to releasable information while shielding the internal networks from outside attacks.</Definition>
    </Entry>
    <Entry>
        <Term>DNS</Term>
        <Definition>Domain Name System</Definition>
    </Entry>
    <Entry>
        <Term>DoD</Term>
        <Definition>Department of Defense</Definition>
    </Entry>
    <Entry>
        <Term>DOS</Term>
        <Definition>Disk Operating System</Definition>
    </Entry>
    <Entry>
        <Term>DSL</Term>
        <Definition>Digital subscriber line</Definition>
    </Entry>
    <Entry>
        <Term>dst</Term>
        <Definition>destination</Definition>
    </Entry>
	</Section>
	<Section Letter="E">
    <Entry>
        <Term>Ephemeral ports</Term>
        <Definition>Ports that are reserved for temporary use by the client end of client-server communications. Also see Well Known ports.</Definition>
    </Entry>
    <Entry>
        <Term>eq</Term>
        <Definition>The equivalent to the double equal sign</Definition>
    </Entry>
    <Entry>
        <Term>established</Term>
        <Definition>Used with flow; tells the rule to fire on established TCP connections only </Definition>
    </Entry>
    <Entry>
        <Term>Exchange Server/Client:</Term>
        <Definition>The port list includes a conglomeration of ports and services utilized by Microsoft Exchange for the sending and receiving of email messages.</Definition>
    </Entry>
    <Entry>
        <Term>EXE</Term>
        <Definition>"exe" is a filename extension denoting an executable file. It is most commonly identified with Microsoft based systems.</Definition>
    </Entry>
    <Entry>
        <Term>exfiltration </Term>
        <Definition>The unauthorized removal or transfer of data from a computer system including, but not limited to, system data, confidential or classified data, passwords, and PII.</Definition>
    </Entry>
	</Section>
	<Section Letter="F">
    <Entry>
        <Term>Flags</Term>
        <Definition>Packet header field that determines whether routers are allowed to fragment a packet into segments. If fragmentation is allowed, then this field also identifies parts of the packet for the receiver. Also called command line options. </Definition>
    </Entry>
    <Entry>
        <Term>Flow Data</Term>
        <Definition>Data about the flow of traffic through a network, typically in the form of conversations and includes IP addresses, ports, and the amount of bytes transferred.</Definition>
    </Entry>
    <Entry>
        <Term>flow (Snort rule option)</Term>
        <Definition>Indicates which side of the network session is to be analyzed for content. </Definition>
    </Entry>
    <Entry>
        <Term>FTP</Term>
        <Definition>File Transfer Protocol</Definition>
    </Entry>
    <Entry>
        <Term>File Format Attack</Term>
        <Definition>File format attacks exploit the integrity of a file, and occur when the structure of a file is modified with the intent of adding malicious code.</Definition>
    </Entry>
    <Entry>
        <Term>Fusion Analyst</Term>
        <Definition>A fusion analyst compiles and evaluates data from multiple sources to include intelligence, technical, qualitative, and formulaic to identify, assess, and mitigate perceived threats. </Definition>
    </Entry>
	</Section>
	<Section Letter="G">
    <Entry>
        <Term>GetProcAddress</Term>
        <Definition>Retrieves the address of an exported function or variable from the specified dynamic-link library (DLL).</Definition>
    </Entry>
    <Entry>
        <Term>gid (Snort rule option)</Term>
        <Definition>Identifies what function of Snort generates the alert such as the rules engine, preprocessor, or decoder.</Definition>
    </Entry>
    <Entry>
        <Term>GUI</Term>
        <Definition>Graphical User Interface</Definition>
    </Entry>
    <Entry>
        <Term>GUID</Term>
        <Definition>Globally Unique Identifier</Definition>
    </Entry>
	</Section>
	<Section Letter="H">
    <Entry>
        <Term>hacker</Term>
        <Definition>Unauthorized user who attempts to or gains access to an information system. In the context of this course, hacker refers to an individual, group, or nation state that perpetrates malicious cyber events in the interest of cybercrime, espionage, or vandalism. See also "adversary," "malicious actor," and "threat actor."</Definition>
    </Entry>
    <Entry>
        <Term>Hanlon's Razor</Term>
        <Definition>Maxim that reads, “Never attribute to malice that which can be adequately explained by stupidity.”</Definition>
    </Entry>
    <Entry>
        <Term>header</Term>
        <Definition>Portion of a data packet or datagram that contains identifying information such as the IP version number and the source and destination addresses.</Definition>
    </Entry>
    <Entry>
        <Term>HIDS</Term>
        <Definition>Host-based Intrusion Detection System. See Host-based IDS.</Definition>
    </Entry>
    <Entry>
        <Term>HIPAA</Term>
        <Definition>Health Insurance Portability and Accountability Act which sets standards for the security of protected healthcare information.</Definition>
    </Entry>
    <Entry>
        <Term>host</Term>
        <Definition>The word "host" followed by an IP address is a primitive that instructs a sniffer to look for packets with that source or destination IP address</Definition>
    </Entry>
    <Entry>
        <Term>Host-based IDS</Term>
        <Definition>IDS that operates on information collected from within an individual computer system. This vantage point allows host-based IDSes to determine exactly which processes and user accounts are involved in a particular attack on the Operating System. Furthermore, unlike network-based IDSes, host-based IDSes can more readily "see" the intended outcome of an attempted attack, because they can directly access and monitor the data files and system processes usually targeted by attacks.</Definition>
    </Entry>
    <Entry>
        <Term>HTTP</Term>
        <Definition>Hypertext Transfer Protocol</Definition>
    </Entry>
    <Entry>
        <Term>HTTPS</Term>
        <Definition>Hypertext Transfer Protocol Secure</Definition>
    </Entry>
	</Section>
	<Section Letter="I">
    <Entry>
        <Term>I&W</Term>
        <Definition>Indications and Warning. Sensing of changes in adversary activities to include intelligence activities intended to detect and report time-sensitive intelligence information on foreign developments that could involve a threat to the United States or allied military, political, or economic interests or to U.S. citizens abroad.</Definition>
    </Entry>
    <Entry>
        <Term>IAT</Term>
        <Definition>Information Assurance Technical. Technical training requirement to perform a given technical IA function</Definition>
    </Entry>
    <Entry>
        <Term>IATA</Term>
        <Definition>Information Assurance Technical Advisory. Provides a mechanism to inform all entities of the latest system vulnerabilities and appropriate countermeasures. IATAs are simply notifications and require no specific action.</Definition>
    </Entry>
    <Entry>
        <Term>IAVA</Term>
        <Definition>Information Assurance Vulnerability Alert. Provides a mechanism to inform all entities of the latest system vulnerabilities and appropriate countermeasures. IAVAs require both acknowledgement and compliance. </Definition>
    </Entry>
    <Entry>
        <Term>IAVB</Term>
        <Definition>Information Assurance Vulnerability Bulletin. Provides a mechanism to inform all entities of the latest system vulnerabilities and appropriate countermeasures. IAVBs require only acknowledgement.</Definition>
    </Entry>
    <Entry>
        <Term>IAVM</Term>
        <Definition>Information Assurance Vulnerability Management</Definition>
    </Entry>
    <Entry>
        <Term>ID</Term>
        <Definition>identification</Definition>
    </Entry>
    <Entry>
        <Term>ICMP</Term>
        <Definition>Internet Control Message Protocol</Definition>
    </Entry>
    <Entry>
        <Term>IDS</Term>
        <Definition>Intrusion Detection System. See Intrusion Detection System.</Definition>
    </Entry>
    <Entry>
        <Term>INFOCON</Term>
        <Definition>Information Operations Condition. A cyber-specific threat level system similar to FPCON and DEFCON.</Definition>
    </Entry>
    <Entry>
        <Term>integrity </Term>
        <Definition>Guarding against improper information modification or destruction, and ensuring information nonrepudiation and authenticity</Definition>
    </Entry>
    <Entry>
        <Term>Internet</Term>
        <Definition>The Internet is the single, interconnected, worldwide system of commercial, governmental, educational, and other computer networks that share (a) the protocol suite specified by the IAB and (b) the name and address spaces managed by the Internet Corporation for Assigned Names and Numbers (ICANN).</Definition>
    </Entry>
    <Entry>
        <Term>Internet Information Service</Term>
        <Definition>Microsoft-developed web server.</Definition>
    </Entry>
    <Entry>
        <Term>intrusion</Term>
        <Definition>Unauthorized act of bypassing the security mechanisms of a system</Definition>
    </Entry>
    <Entry>
        <Term>Intrusion Detection System</Term>
        <Definition>Hardware or software products that gather and analyze information from various areas within a computer or a network to identify possible security breaches, which include both intrusions (attacks from outside the organizations) and misuse (attacks from with the organizations)</Definition>
    </Entry>
    <Entry>
        <Term>IP</Term>
        <Definition>Internet Protocol is a standard protocol for transmission of data from source to destinations in packet-switched communications networks and interconnected systems of such networks</Definition>
    </Entry>
    <Entry>
        <Term>IPFIX </Term>
        <Definition>Provides information about the flow of traffic through a network, showing connections and a record of converations including IP addresses, ports, and the volume of data transferred. IPFIX is a universal protocol developed by the IETF. See also "NetFlow" and "sFlow."</Definition>
    </Entry>
    <Entry>
        <Term>IPv4</Term>
        <Definition>Internet Protocol version 4</Definition>
    </Entry>
    <Entry>
        <Term>IPv6</Term>
        <Definition>Internet Protocol version 6</Definition>
    </Entry>
    <Entry>
        <Term>IPX</Term>
        <Definition>Internetwork Packet Exchange</Definition>
    </Entry>
    <Entry>
        <Term>IRC</Term>
        <Definition>Internet Relay Chat is a multi-user multi-channel chat system that is neither client nor network specific.</Definition>
    </Entry>
    <Entry>
        <Term>ISP</Term>
        <Definition>Internet service provider</Definition>
    </Entry>
	</Section>
	<Section Letter="J">
    <Entry>
        <Term>JOIN</Term>
        <Definition>Join command</Definition>
    </Entry>
    <Entry>
        <Term>Joint Malware Catalog (JMC)</Term>
        <Definition>The JMC is the central repository for storing malware and associated analysis. It serves as the primary reporting mechanism for submitting software artifacts such as viruses, rootkits, and worms.</Definition>
    </Entry>
	</Section>
	<Section Letter="K">
    <Entry>
        <Term>kernel</Term>
        <Definition>The central module of an operating system. It is the part of the operating system that loads first, and it remains in main memory. Because it stays in memory, it is important for the kernel to be as small as possible while still providing all the essential services required by other parts of the operating system and applications. Typically, the kernel is responsible for memory management, process and task management, and disk management. </Definition>
    </Entry>
    <Entry>
        <Term>Keylogger</Term>
        <Definition>A keylogger is a hardware device or software designed to capture keystrokes input by the user on the keyboard.</Definition>
    </Entry>
	</Section>
	<Section Letter="L">
    <Entry>
        <Term>LAN</Term>
        <Definition>local area network</Definition>
    </Entry>
    <Entry>
        <Term>Leverage Social Networking</Term>
        <Definition>Where attackers leverage these trust relationships built on social networks and the relatively open nature of social networking sites to target victims. The targeting can take many forms, but is often accomplished by exploiting an individual trusted by the victim or trying to establish a trust relationship with the victim directly.</Definition>
    </Entry>
    <Entry>
        <Term>libpcap</Term>
        <Definition>Libpcap is a portable C/C++ packet capture (pcap) library that provides the framework for reading and writing data in a standard format for tcpdump. It is used with UNIX-like platforms.</Definition>
    </Entry>
    <Entry>
        <Term>Linux</Term>
        <Definition>A family of operating systems similar to UNIX but composed of open source tools, resources, and software.</Definition>
    </Entry>
    <Entry>
        <Term>LNK </Term>
        <Definition>A file type primarily associated with Microsoft Windows as a shortcut file that points to a .EXE file. </Definition>
    </Entry>
    <Entry>
        <Term>Load Library</Term>
        <Definition>The LoadLibrary API is useful for executing malicious code, injecting malicious code into DLLs, and providing access to DLLs.</Definition>
    </Entry>
    <Entry>
        <Term>log (Snort rule action)</Term>
        <Definition>Tells Snort to log the packet</Definition>
    </Entry>
    <Entry>
        <Term>Log Data</Term>
        <Definition>Independent, machine-generated records of activities on networks, appliances, hosts, and applications. Including, but not limited to, operating system logs, network logs, web server logs, firewall logs, DNS logs, web application logs, and database logs.</Definition>
    </Entry>
    <Entry>
        <Term>Logical Operators</Term>
        <Definition>Primitives can be combined with the logical operators "and," "not," and "or" to add another layer of filtering.</Definition>
    </Entry>
	</Section>
	<Section Letter="M">
    <Entry>
        <Term>MAC address</Term>
        <Definition>Media Access Control address. The unique identifier for each network assigned to network interface cards by the manufacturer.</Definition>
    </Entry>
    <Entry>
        <Term>Magic Number</Term>
        <Definition>The ASCII or hexadecimal string at the beginning of a file that can identify certain file types and protocols.</Definition>
    </Entry>
    <Entry>
        <Term>Malicious Actor</Term>
        <Definition>In the context of this course, a malicious actor is an individual, group, or nation state that perpetrates malicious cyber events in the interest of cybercrime, espionage, or vandalism. See also "adversary," "hacker," and "threat actor."</Definition>
    </Entry>
    <Entry>
        <Term>Mariposa</Term>
        <Definition>The Mariposa botnet was created using the Butterfly bot. The botnet infiltrated about 13 million personal, government, and corporate systems in 190 countries before it was dismantled in December 2009. </Definition>
    </Entry>
    <Entry>
        <Term>Metasploit </Term>
        <Definition>An open-source exploitation framework often used by threat actors. </Definition>
    </Entry>
    <Entry>
        <Term>Mission Assurance Category (MAC)</Term>
        <Definition>The mission assurance category reflects the importance of information relative to the achievement of DoD goals and objectives, particularly the warfighters' combat mission. Mission assurance categories are primarily used to determine the requirements for availability and integrity. The Department of Defense has three defined mission assurance categories.</Definition>
    </Entry>
    <Entry>
        <Term>msg (Snort rule option)</Term>
        <Definition>The message to print when an alert is triggered </Definition>
    </Entry>
    <Entry>
        <Term>MZ</Term>
        <Definition>The message to print when an alert is triggered </Definition>
    </Entry>
	</Section>
	<Section Letter="N">
    <Entry>
        <Term>NetFlow </Term>
        <Definition>Provides information about the flow of traffic through a network, showing connections and a record of converations including IP addresses, ports, and the volume of data transferred. NetFlow is a Cisco specific protocol. See also "IPFIX" and "sFlow."</Definition>
    </Entry>
    <Entry>
        <Term>network</Term>
        <Definition>Information system(s) implemented with a collection of interconnected components. Such components may include routers, hubs, cabling, telecommunications controllers, key distribution centers, and technical control devices.</Definition>
    </Entry>
    <Entry>
        <Term>Network-based Intrusion Detection System</Term>
        <Definition>IDS that detects attacks by capturing and analyzing network packets. Listening on a network segment or switch, one network-based IDS can monitor the network traffic affecting multiple hosts that are connected to the network segment.</Definition>
    </Entry>
    <Entry>
        <Term>NIDS</Term>
        <Definition>Network intrusion detection system</Definition>
    </Entry>
    <Entry>
        <Term>nonvolatile data </Term>
        <Definition>Data in the system’s hard drives and removable storage media that will not be changed when the system is shut down. Also known as persistent data.</Definition>
    </Entry>
    <Entry>
        <Term>nocase (Snort content modifier)</Term>
        <Definition>Tells Snort to ignore case in searching packet payload for content.</Definition>
    </Entry>
	</Section>
	<Section Letter="O">
    <Entry>
        <Term>offset (Snort content modifier)</Term>
        <Definition>Specifies where in a packet, defined by number of bytes, Snort should start searching a packet for content patterns.</Definition>
    </Entry>
    <Entry>
        <Term>Open Source</Term>
        <Definition>Readily available and free</Definition>
    </Entry>
    <Entry>
        <Term>Open Systems Interconnection (OSI) model</Term>
        <Definition>Worldwide network communications standard developed by the International Organization for Standardization, or ISO, which conceptualizes a 7-layer approach for connecting dissimilar systems with a set of standards, or protocols, allowing the systems to work together</Definition>
    </Entry>
    <Entry>
        <Term>Operation Buckshot Yankee</Term>
        <Definition>A U.S. intelligence and military effort to neutralize the malware Agent.btz within the government computer networks and to clean the networks.</Definition>
    </Entry>
    <Entry>
        <Term>operational impact (OI)</Term>
        <Definition>Operational impact refers to any detrimental effects on an organization’s ability to perform its mission. </Definition>
    </Entry>
    <Entry>
        <Term>OS</Term>
        <Definition>Operating system</Definition>
    </Entry>
    <Entry>
        <Term>OSI</Term>
        <Definition>See Open Systems Interconnection model</Definition>
    </Entry>
    <Entry>
        <Term>Outside-in security model</Term>
        <Definition>Security model that uses defenses like firewalls and server hardening in the belief that attacks begin from external actors. The focus is to prevent malicious activity from penetrating the security perimeter and getting inside the network. Not good at defending against malicious client-side activities that result from internal outbound traffic. </Definition>
    </Entry>
	</Section>
	<Section Letter="P">
    <Entry>
        <Term>packet</Term>
        <Definition>Smallest building blocks of information on networks, which consist of header fields and data, or payload.</Definition>
    </Entry>
    <Entry>
        <Term>Packet Data</Term>
        <Definition>The raw network traffic traversing the "wire".</Definition>
    </Entry>
    <Entry>
        <Term>pass (Snort rule action)</Term>
        <Definition>Tells Snort to ignore the packet</Definition>
    </Entry>
    <Entry>
        <Term>password hash</Term>
        <Definition>The digital fingerprint of a piece of data, to include passwords. To authenticate a hash of the user supplied password is compared to the stored password hash. </Definition>
    </Entry>
    <Entry>
        <Term>patch</Term>
        <Definition>A patch is a an update to programs and plug-ins to close vulnerabilities before they can be exploited. It's difficult to achieve 100% patch coverage, but missing even one patch could compromise the client machine and assests on the network. </Definition>
    </Entry>
    <Entry>
        <Term>PC</Term>
        <Definition>personal computer</Definition>
    </Entry>
    <Entry>
        <Term>pcap</Term>
        <Definition>Packet capture. A raw packet is a packet that is left in its original, unmodified form as it traveled across the network from client to server.</Definition>
    </Entry>
    <Entry>
        <Term>PDF</Term>
        <Definition>Portable Document Format; most commonly associated with Adobe Acrobat</Definition>
    </Entry>
    <Entry>
        <Term>persistent data</Term>
        <Definition>Data in the system’s hard drives and removable storage media that will not be changed when the system is shut down. Also known as nonvolatile data.</Definition>
    </Entry>
    <Entry>
        <Term>PHI</Term>
        <Definition>protected health information. Any individually identifiable health information referring not only to data that is explicitly linked to a particular individual but also includes health information with data items which reasonably could be expected to allow individual identification.</Definition>
    </Entry>
    <Entry>
        <Term>Pivot</Term>
        <Definition>Pivoting is a technique attackers use to further compromise the network after gaining an initial foothold via one compromised system on that network.</Definition>
    </Entry>
    <Entry>
        <Term>port traffic</Term>
        <Definition>Traffic going to or coming from a specific port.</Definition>
    </Entry>
    <Entry>
        <Term>primitive</Term>
        <Definition>A primitive is a shortcut used in Berekely Packet Filter (BPF) expression to specifying the desired contents of headers you want a sniffer to search for.</Definition>
    </Entry>
    <Entry>
        <Term>privilege escalation </Term>
        <Definition>Exploitation of a vulnerability in the system to gain a higher level of authorization on a system.</Definition>
    </Entry>
    <Entry>
        <Term>promiscuous sniffing</Term>
        <Definition>Method to sniff network traffic where the network interface cards is set to promiscuous mode and intercepts all packets on the network, not just those destined for that host.</Definition>
    </Entry>
    <Entry>
        <Term>promiscuous mode</Term>
        <Definition>Capturing packets using promiscuous mode will capture all traffic arriving at the network interface and requires administrator or root level privileges.</Definition>
    </Entry>
    <Entry>
        <Term>protocol</Term>
        <Definition>Set of rules and formats, semantic and syntactic, permitting information systems to exchange information</Definition>
    </Entry>
    <Entry>
        <Term>protocol-based IDS method</Term>
        <Definition>Detection method that analyzes the protocol activity against standard protocol behaviors (other methods include anomaly-based and signature-based)</Definition>
    </Entry>
	</Section>
	<Section Letter="R">
    <Entry>
        <Term>RAM</Term>
        <Definition>Random Access Memory</Definition>
    </Entry>
    <Entry>
        <Term>Red Team </Term>
        <Definition>Assess the security posture of systems, networks, and detection capabilities and recommend improvements to information assurance and CND capabilities.</Definition>
    </Entry>
    <Entry>
        <Term>rev (Snort rule option)</Term>
        <Definition>Revision, used in conjunction with the sid to identify revisions to a rule for updates and changes.</Definition>
    </Entry>
    <Entry>
        <Term>root cause </Term>
        <Definition>The precise sets of conditions that allowed a security incident to occur. </Definition>
    </Entry>
    <Entry>
        <Term>rootkit</Term>
        <Definition>A set of tools used by an attacker after gaining root-level access to a host to conceal the attacker’s activities on the host and permit the attacker to maintain root-level access to the host through covert means.</Definition>
    </Entry>
    <Entry>
        <Term>RPC</Term>
        <Definition>remote procedure call</Definition>
    </Entry>
    <Entry>
        <Term>rule header</Term>
        <Definition>describes the action, IP addresses, ports and direction </Definition>
    </Entry>
    <Entry>
        <Term>rule options</Term>
        <Definition>describe content, message, sid, rev, classtype and other information</Definition>
    </Entry>
	</Section>
	<Section Letter="S">
    <Entry>
        <Term>SEO</Term>
        <Definition>Search Engine Optimization is a collection of techniques used to achieve higher search rankings for a given website. </Definition>
    </Entry>
    <Entry>
        <Term>Session Data</Term>
        <Definition>See Flow Data</Definition>
    </Entry>
    <Entry>
        <Term>sFlow </Term>
        <Definition>Provides information about the flow of traffic through a network, showing connections and a record of converations including IP addresses, ports, and the volume of data transferred. sFlow is a standard originally developed by Inmon. See also "IPFIX" and "NetFlow."</Definition>
    </Entry>
    <Entry>
        <Term>Shell/Shell Access</Term>
        <Definition>Command line access to a system.</Definition>
    </Entry>
    <Entry>
        <Term>sid (Snort rule option)</Term>
        <Definition>Snort® ID, a unique rule identifier</Definition>
    </Entry>
    <Entry>
        <Term>SIEM</Term>
        <Definition>Security Information Event Management. Devices used to gather, analyze, and present event, threat, risk, vulnerability, threat and log data. Security Event Management (SEM) and Security Information Management (SIM) are terms used interchangeably with SIEM.</Definition>
    </Entry>
    <Entry>
        <Term>signature</Term>
        <Definition>Recognizable, distinguishing pattern. See also attack signature.</Definition>
    </Entry>
    <Entry>
        <Term>signature-based IDS method</Term>
        <Definition>Detection method that looks for specific patterns of an attack in the network traffic (other methods include signature-based and anomaly-based)</Definition>
    </Entry>
    <Entry>
        <Term>SMS</Term>
        <Definition>Short Message Service</Definition>
    </Entry>
    <Entry>
        <Term>SMTP</Term>
        <Definition>Simple Mail Transfer Protocol</Definition>
    </Entry>
    <Entry>
        <Term>Sniffers</Term>
        <Definition>A sniffer is a tool that listens to or "sniffs" the traffic traveling between networked devices. It is also called a packet analyzer or protocol analyzer.</Definition>
    </Entry>
    <Entry>
        <Term>Snort</Term>
        <Definition>A free, open source network intrusion detection and prevention system.</Definition>
    </Entry>
    <Entry>
        <Term>Snort Content Modifiers</Term>
        <Definition>Changes how the packet payload will be analyzed for content by Snort.</Definition>
    </Entry>
    <Entry>
        <Term>Snort Rule Action</Term>
        <Definition>Defines what to do in the event of a qualifying packet.</Definition>
    </Entry>
    <Entry>
        <Term>Snort Rule Header</Term>
        <Definition>contains the rule’s action, protocol, source and destination IP addresses and netmasks, and the source and destination ports information.</Definition>
    </Entry>
    <Entry>
        <Term>Snort Rule Options</Term>
        <Definition>contains alert messages and information on which parts of the packet should be inspected to determine if the rule action should be taken.</Definition>
    </Entry>
    <Entry>
        <Term>Social Engineering</Term>
        <Definition>Social engineering is an attempt to trick someone into revealing information (e.g., a password) that can be used to attack an enterprise.</Definition>
    </Entry>
    <Entry>
        <Term>Source Address</Term>
        <Definition>Provides the IP address of the original sender.</Definition>
    </Entry>
    <Entry>
        <Term>src</Term>
        <Definition>source</Definition>
    </Entry>
    <Entry>
        <Term>SSH</Term>
        <Definition>Secure Shell</Definition>
    </Entry>
    <Entry>
        <Term>Stage 2 Executable</Term>
        <Definition>The Stage 2 or second stage download occurs after the initial compromise. The initial compromise typically yields code execution capability and then downloads the second stage, which provides more robust and malicious capabilities.</Definition>
    </Entry>
    <Entry>
        <Term>Statisctical Data</Term>
        <Definition>All simple counters and statistics provided by devices or information systems that could prove useful to CND analysts.</Definition>
    </Entry>
    <Entry>
        <Term>STIG</Term>
        <Definition>Security Technical Implementation Guide</Definition>
    </Entry>
    <Entry>
        <Term>Storm Worm</Term>
        <Definition>A worm that infected 1-10 million computers creating the Storm botnet. It was unique in that it used a combination of vectors (exploits, OS kernel attacks, email links about current disasters) to attack computers. </Definition>
    </Entry>
    <Entry>
        <Term>Strings</Term>
        <Definition>Strings is a tool you can use during a first pass analysis of packet data. This tool searches binary pcap files looking for ASCII printable characters. Example: strings -n 8 file1.pcap</Definition>
    </Entry>
	</Section>
	<Section Letter="T">
    <Entry>
        <Term>tag (Snort rule option)</Term>
        <Definition>Allow rules to log more than just the single packet that triggered the rule. Once a rule is triggered, additional traffic involving the source and/or destination host is tagged. Tagged traffic is logged</Definition>
    </Entry>
    <Entry>
        <Term>TCP</Term>
        <Definition>Transmission Control Protocol</Definition>
    </Entry>
    <Entry>
        <Term>tcpdump</Term>
        <Definition>Tcpdump is an open source command-line packet analyzer for Linux and UNIX systems. </Definition>
    </Entry>
    <Entry>
        <Term>TCP/IP</Term>
        <Definition>Transmission Control Protocol/Internet Protocol is the underlying protocol of the Internet, developed by a DoD agency called Defense Advanced Research Projects Agency (DARPA). Also refers to a model of interoperability that conceptualizes a 4-layer framework for connecting dissimilar systems with a set of standards, or protocols, allowing the systems to work together. Also see Open Systems Interconnection model.</Definition>
    </Entry>
    <Entry>
        <Term>TCP/UDP</Term>
        <Definition>Transmission Control Protocol/User Datagram Protocol</Definition>
    </Entry>
    <Entry>
        <Term>TDL-4</Term>
        <Definition>TDL-4 is a fourth generation variant of the TDSS rootkit (discovered in 2008). It can infect both 32-bit and 64-bit operating systems. TDL-4 encrypts communications between the botnet command and control centers and the infected computers. </Definition>
    </Entry>
    <Entry>
        <Term>technical impact (TI)</Term>
        <Definition>Technical impact refers to any detrimental effects on the technical capabilities of the organization. TI typically refers to the impacts on the network or systems that are directly or indirectly affected by the incident.</Definition>
    </Entry>
    <Entry>
        <Term>TFTP</Term>
        <Definition>Trivial File Transport Protocol </Definition>
    </Entry>
    <Entry>
        <Term>threat actor</Term>
        <Definition>In the context of this course, a threat actor is an individual, group, or nation state that perpetrates malicious cyber events in the interest of cybercrime, espionage, or vandalism. See also "adversary," "hacker," and "malicious actor."</Definition>
    </Entry>
    <Entry>
        <Term>Titan Rain</Term>
        <Definition>FBI designation for a 2003 coordinated cyber-attack targeting a variety of US based military and government systems traced back to what is believed to be cyber-espionage ring in the Guangdong province of China.</Definition>
    </Entry>
    <Entry>
        <Term>TShark</Term>
        <Definition>TShark is the command-line version of Wireshark. It uses the packet capture filtering mechanism of tcpdump and has some of the analysis capabilities of Wireshark.</Definition>
    </Entry>
    <Entry>
        <Term>TTP</Term>
        <Definition>Tactics, Techniques, and Procedures </Definition>
    </Entry>
	</Section>
	<Section Letter="U">
    <Entry>
        <Term>UDP</Term>
        <Definition>User Datagram Protocol</Definition>
    </Entry>
    <Entry>
        <Term>untrusted networks</Term>
        <Definition>These techniques include, but are not limited to, disabling unnecessary services; preventing use of unsecure services; up-to-date patching; and strong password policies. </Definition>
    </Entry>
    <Entry>
        <Term>URL</Term>
        <Definition>Uniform Resource Locator</Definition>
    </Entry>
    <Entry>
        <Term>USB</Term>
        <Definition>Uniform Serial Bus</Definition>
    </Entry>
	</Section>
	<Section Letter="V">
    <Entry>
        <Term>VAA</Term>
        <Definition>Vulnerability Analysis and Assessment. Primary method of measuring the CND posture of DoD systems and networks based on open vulnerabilities.</Definition>
    </Entry>
    <Entry>
        <Term>VBA</Term>
        <Definition>Visual Basic for Applications</Definition>
    </Entry>
    <Entry>
        <Term>VBScript</Term>
        <Definition>Visual Basic Scripting Edition</Definition>
    </Entry>
    <Entry>
        <Term>Vector</Term>
        <Definition>Method or paths used to deliver malicious code. Such as email, attachments, downloaded files, etc. </Definition>
    </Entry>
    <Entry>
        <Term>Vuertual Network Connection (VNC)</Term>
        <Definition>Remote desktop software that provides graphical desktop sharing via the RFB protocol</Definition>
    </Entry>
    <Entry>
        <Term>VoIP</Term>
        <Definition>Voice over IP</Definition>
    </Entry>
    <Entry>
        <Term>volatile data </Term>
        <Definition>Any data stored in system memory that may be permanently lost when the system loses power, is rebooted, or is shut down. </Definition>
    </Entry>
	</Section>
	<Section Letter="W">
    <Entry>
        <Term>WinDump</Term>
        <Definition>WinDump is an open source command-line packet analyzer for Windows environments.</Definition>
    </Entry>
    <Entry>
        <Term>WinPcap</Term>
        <Definition>WinPcap provides the framework for reading and writing data in a standard format for WinDump. It is based on the libpcap model and Berkeley Packet Filters (BPFs) for UNIX and runs on Win32 and Win64 platforms. </Definition>
    </Entry>
    <Entry>
        <Term>Wireshark</Term>
        <Definition>Wireshark is a free complex protocol analyzer that uses a graphical user interface (GUI) to display analysis results. It can identify header fields for intrusion detection and analyze data payload. It was formerly known as Ethereal.</Definition>
    </Entry>
    <Entry>
        <Term>within (Snort content modifier)</Term>
        <Definition>Tells Snort how many bytes deep in the packet to search after the previous content match.</Definition>
    </Entry>
    <Entry>
        <Term>Whitelisting</Term>
        <Definition>Whitelisting is a technique that allows domains from trusted to untrusted networks or applications and file-types permitted to run on a system.</Definition>
    </Entry>
    <Entry>
        <Term>worms</Term>
        <Definition>Self propogating malicious code. Also known as "malware."</Definition>
    </Entry>
    <Entry>
        <Term>WWW</Term>
        <Definition>World Wide Web</Definition>
    </Entry>
	</Section>
	<Section Letter="X">
    <Entry>
        <Term>XSS</Term>
        <Definition>Cross-site scripting, or XSS, attacks insert or modify scripts, such as JavaScript, HTML, Flash, ActiveX, or VBScript, that are embedded on a web page and are executed on the client-side, in the user’s browser.</Definition>
    </Entry>
	</Section>
	<Section Letter="Z">
    <Entry>
        <Term>zombie</Term>
        <Definition>An individual computer, smartphone, or device controlled by someone running a botnet. See also bot. </Definition>
    </Entry>
	</Section>
</Glossary>