TCP/IP Security

Moderator: davidyin

Post Reply
User avatar
luckyman
Site Admin
Site Admin
Posts: 135
Joined: Wed Apr 27, 2005 6:17 pm

TCP/IP Security

Post by luckyman »

Back door: A hidden pathway for gaining entry to a computer system.

Buffer overflow: An attack method that lets the attacker deliver malicious commands to a system by overrunning an application buffer.

Denial-of-service attack (DoS): An attack designed to cripple the victim's system by consuming system resources.

DMZ: An intermediate space inhabited by internet servers that fall behind a front firewall and in front of a more restrictive firewall protecting an internal network.

Firewall: A device or application that restricts network access to an internal network.

Packet filter: A firewall that filters by port number or other protocol information indicating the purpose of the packet.

Phishing: Using a fake link, message, or web page to entice the user into initiating a connection with a fraudulent website.

Proxy server: A computer or application that requests services on behalf of a client.

Reverse proxy" A computer or application that receives inbound requests from the Internet and forwards them to an internal server.

Root access: The highest level of access to a computer system. Root access offers nearly unlimited control of the system.

Rootkit: A set of tools used by an intruder to expand and disguise his control of a system.

Script kiddies: Young, usually adolescent Internet intruders who work mostly with ready-made scripts and tools available on the Internet.

Session hijacking: An attack method that lets the attacker insert malicious packets into an existing TCP session.

Stateful firewall: A firewall that is aware of the state of the connection.

Trojan horse: A program that purports to do one thing by actually takes other unseen and malicious actions behind the scenes.

Post Reply