Back door: A hidden pathway for gaining entry to a computer system.
Buffer overflow: An attack method that lets the attacker deliver malicious commands to a system by overrunning an application buffer.
Denial-of-service attack (DoS): An attack designed to cripple the victim's system by consuming system resources.
DMZ: An intermediate space inhabited by internet servers that fall behind a front firewall and in front of a more restrictive firewall protecting an internal network.
Firewall: A device or application that restricts network access to an internal network.
Packet filter: A firewall that filters by port number or other protocol information indicating the purpose of the packet.
Phishing: Using a fake link, message, or web page to entice the user into initiating a connection with a fraudulent website.
Proxy server: A computer or application that requests services on behalf of a client.
Reverse proxy" A computer or application that receives inbound requests from the Internet and forwards them to an internal server.
Root access: The highest level of access to a computer system. Root access offers nearly unlimited control of the system.
Rootkit: A set of tools used by an intruder to expand and disguise his control of a system.
Script kiddies: Young, usually adolescent Internet intruders who work mostly with ready-made scripts and tools available on the Internet.
Session hijacking: An attack method that lets the attacker insert malicious packets into an existing TCP session.
Stateful firewall: A firewall that is aware of the state of the connection.
Trojan horse: A program that purports to do one thing by actually takes other unseen and malicious actions behind the scenes.
TCP/IP Security
Moderator: davidyin