Cyber Primer
AEWhbF
AEWhbF
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Lexicon<br />
secure sockets layer<br />
(SSL)<br />
A protocol developed by Netscape for transmitting private documents via<br />
the Internet. SSL works by using a public key to encrypt data out that’s<br />
transferred over the SSL connection. (SANS)<br />
signals intelligence<br />
The generic term used to describe communications intelligence and<br />
electronic intelligence when there is no requirement to differentiate<br />
between these two types of intelligence, or to represent fusion of the two.<br />
(AAP-06)<br />
spam<br />
Irrelevant or unsolicited messages sent over the Internet, typically to large<br />
numbers of users. (COED)<br />
SQL injection<br />
SQL injection is a type of input validation attack specific to<br />
database-driven applications where SQL code is inserted into application<br />
queries to manipulate the database. (SANS)<br />
spear phishing<br />
Spear phishing is a form of phishing that is aimed at a specific target<br />
audience and worded in such a way as to appeal to that audience. Although<br />
this requires more effort and knowledge about who is being targeted, spear<br />
phishing is more likely to be successful and users find it harder to detect.<br />
(MOD Information Management Passport – <strong>Cyber</strong> module)<br />
spoofing<br />
Spoofing is activity to make a transmission appear to come from a source<br />
other than the real source of the transmission. Spoofing is commonly seen<br />
in phishing emails, where the email address that the message appears to be<br />
from is not the real origin of the message.<br />
(MOD Information Management Passport – <strong>Cyber</strong> module)<br />
88<br />
<strong>Cyber</strong> <strong>Primer</strong> (2nd Edition)