Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA
Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA
Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Threat source—Either (1) <strong>in</strong>tent and method targeted at the <strong>in</strong>tentional exploitation of a<br />
vulnerability, or (2) a situation and method that may accidentally trigger a vulnerability.<br />
TLL field—The time to live (TTL) field <strong>in</strong>dicates to routers whether the packet has been <strong>in</strong> the<br />
network too long and should be discarded. More specifically, this field <strong>in</strong> the IPv4 packet header<br />
is a counter used to limit packet lifetimes to protect aga<strong>in</strong>st rout<strong>in</strong>g loops. It is decremented at<br />
each hop. When the TTL becomes zero, then the packet is discarded. This field is known as the<br />
hop limit field <strong>in</strong> IPv6 packet headers.<br />
Traceroute—Traceroute is a popular application that was orig<strong>in</strong>ally created by Van Jacobson to<br />
enumerate the series of IP network hops (e.g., routers) that a packet traverses to reach its<br />
dest<strong>in</strong>ation. It is <strong>in</strong>voked as “traceroute hostname” where hotstname is the dest<strong>in</strong>ation target.<br />
The user then will receive a report enumerat<strong>in</strong>g every router between the <strong>in</strong>vocation location<br />
node and the dest<strong>in</strong>ation node.<br />
Trust—Reliance on the ability of a system to meet its specifications.<br />
Vulnerability—A flaw or weakness <strong>in</strong> system security procedures, design, implementation, or<br />
<strong>in</strong>ternal controls that could be exercised (accidentally triggered or <strong>in</strong>tentionally exploited) and<br />
could result <strong>in</strong> a security breach or a violation of the system’s security policy.<br />
whois—Quote from http://en.wikipedia.org/wiki/Whois: “WHOIS (pronounced “who is”; not an<br />
acronym) is a TCP-based query/response protocol that is widely used for query<strong>in</strong>g an official<br />
database to determ<strong>in</strong>e the owner of a doma<strong>in</strong> name, an IP address, or an autonomous system<br />
number on the Internet. WHOIS lookups were traditionally made us<strong>in</strong>g a command l<strong>in</strong>e<br />
<strong>in</strong>terface, but a number of simplified web-based tools now exist for look<strong>in</strong>g up doma<strong>in</strong><br />
ownership details from different databases. Web-based WHOIS clients still rely on the WHOIS<br />
protocol to connect to a WHOIS server and do lookups, and command-l<strong>in</strong>e WHOIS clients are<br />
still quite widely used by system adm<strong>in</strong>istrators” An example is http://www.whois.net/<br />
161/162