Cyber Primer
AEWhbF
AEWhbF
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Lexicon<br />
distributed denial of service attack<br />
Distributed denial of service (DDoS) attack seeks to overload a service,<br />
usually web-based, by repeatedly sending requests for information or<br />
messages many times a second. These attacks prevent legitimate users from<br />
accessing the service. Distributed denial of service attack uses multiple PCs<br />
to launch the attack, which increases the disruption, and attackers usually<br />
make use of a botnet. (<strong>Cyber</strong> Security Operations Centre (CSOC))<br />
electronic warfare<br />
Military action that exploits electromagnetic energy to provide situational<br />
awareness and achieve offensive and defensive effects.<br />
(Allied Administrative Publication (AAP)-06)<br />
firewall<br />
A part of a computer system or network which is designed to block<br />
unauthorised access while permitting outward communication. (COED)<br />
global positioning system<br />
(GPS)<br />
An accurate worldwide navigational and surveying facility based on the<br />
reception of signals from an array of orbiting satellites. (COED)<br />
honeypots and honeynets<br />
Programs that simulate one or more network services that you designate<br />
on your computer’s ports. An attacker assumes you’re running vulnerable<br />
services that can be used to break into the machine. A honeypot can be used<br />
to log access attempts to those ports including the attacker’s keystrokes.<br />
This could give you advanced warning of a more concerted attack. (SANS)<br />
human intelligence<br />
A category of intelligence derived from information collected and provided<br />
by human sources. (AAP-06)<br />
86<br />
<strong>Cyber</strong> <strong>Primer</strong> (2nd Edition)