13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Threat source—Either (1) <strong>in</strong>tent and method targeted at the <strong>in</strong>tentional exploitation of a<br />

vulnerability, or (2) a situation and method that may accidentally trigger a vulnerability.<br />

TLL field—The time to live (TTL) field <strong>in</strong>dicates to routers whether the packet has been <strong>in</strong> the<br />

network too long and should be discarded. More specifically, this field <strong>in</strong> the IPv4 packet header<br />

is a counter used to limit packet lifetimes to protect aga<strong>in</strong>st rout<strong>in</strong>g loops. It is decremented at<br />

each hop. When the TTL becomes zero, then the packet is discarded. This field is known as the<br />

hop limit field <strong>in</strong> IPv6 packet headers.<br />

Traceroute—Traceroute is a popular application that was orig<strong>in</strong>ally created by Van Jacobson to<br />

enumerate the series of IP network hops (e.g., routers) that a packet traverses to reach its<br />

dest<strong>in</strong>ation. It is <strong>in</strong>voked as “traceroute hostname” where hotstname is the dest<strong>in</strong>ation target.<br />

The user then will receive a report enumerat<strong>in</strong>g every router between the <strong>in</strong>vocation location<br />

node and the dest<strong>in</strong>ation node.<br />

Trust—Reliance on the ability of a system to meet its specifications.<br />

Vulnerability—A flaw or weakness <strong>in</strong> system security procedures, design, implementation, or<br />

<strong>in</strong>ternal controls that could be exercised (accidentally triggered or <strong>in</strong>tentionally exploited) and<br />

could result <strong>in</strong> a security breach or a violation of the system’s security policy.<br />

whois—Quote from http://en.wikipedia.org/wiki/Whois: “WHOIS (pronounced “who is”; not an<br />

acronym) is a TCP-based query/response protocol that is widely used for query<strong>in</strong>g an official<br />

database to determ<strong>in</strong>e the owner of a doma<strong>in</strong> name, an IP address, or an autonomous system<br />

number on the Internet. WHOIS lookups were traditionally made us<strong>in</strong>g a command l<strong>in</strong>e<br />

<strong>in</strong>terface, but a number of simplified web-based tools now exist for look<strong>in</strong>g up doma<strong>in</strong><br />

ownership details from different databases. Web-based WHOIS clients still rely on the WHOIS<br />

protocol to connect to a WHOIS server and do lookups, and command-l<strong>in</strong>e WHOIS clients are<br />

still quite widely used by system adm<strong>in</strong>istrators” An example is http://www.whois.net/<br />

161/162

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!