IT Information Security Glossary

Total Page:16

File Type:pdf, Size:1020Kb

IT Information Security Glossary Department of Information Technology State of North Carolina S TATEWIDE G LOSSARY OF I NFORMATION T E C H N O L O G Y T ERMS May 2020 G L O S S A R Y O F INFORMATION TECHNOLOGY TERMS Table of Contents PURPOSE .............................................................................................................................. 3 SCOPE ................................................................................................................................... 3 GLOSSARY OF TERMS ........................................................................................................ 3 General ..................................................................................................................................... 3 A ................................................................................................................................................ 3 B .............................................................................................................................................. 11 C .............................................................................................................................................. 15 D .............................................................................................................................................. 26 E .............................................................................................................................................. 32 F .............................................................................................................................................. 37 G ............................................................................................................................................. 41 H ............................................................................................................................................. 42 I ............................................................................................................................................... 44 J ............................................................................................................................................... 51 K ............................................................................................................................................. 51 L .............................................................................................................................................. 52 M ............................................................................................................................................. 53 N .............................................................................................................................................. 58 O ............................................................................................................................................. 60 P .............................................................................................................................................. 63 Q ............................................................................................................................................. 72 R .............................................................................................................................................. 72 S .............................................................................................................................................. 77 T .............................................................................................................................................. 85 U .............................................................................................................................................. 90 V .............................................................................................................................................. 91 W ............................................................................................................................................. 93 X .............................................................................................................................................. 95 Y .............................................................................................................................................. 95 Z .............................................................................................................................................. 95 2 G L O S S A R Y O F INFORMATION TECHNOLOGY TERMS PURPOSE The purpose of this Glossary of Terms is to provide a central repository of terms that apply to documentation created and maintained by the North Carolina Office of the State Chief Information Officer (State CIO). SCOPE This document covers all State information technology areas that fall under the responsibility of the State CIO. The definitions apply to statewide information technology policies, standards and the statewide architecture for all government agencies of the State of North Carolina. HISTORY This glossary was first published in 2005. It has been updated as terms were added or changed to the information technology and security lexicon. This edition of the Glossary was updated and published in May 2020. GLOSSARY OF TERMS GENERAL 3- Way Handshake – Machine A sends a packet with a SYN flag set to Machine B. B acknowledges A’s SYN with a SYN/ACK. A acknowledges B’s SYN/ACK with an ACK. A AAM – After Action Meeting AAR – After Action Report ACL – Access Control List ACWP – Actual Cost of Work Perform AES – Advanced Encryption Standard AP – Access point APT – Advanced Persistent Threat ARP – Address Resolution Protocol 3 G L O S S A R Y O F INFORMATION TECHNOLOGY TERMS Abstraction – A representation of an entity that contains less information than the entity. Acceptance – Final approval and receipt of a product or service by the customer. Acceptance Criteria – The list of requirements that must be satisfied prior to the customer accepting delivery of the product. Acceptance Management – The process used throughout the project to obtain approval for products or services. Acceptance Test – Formal user testing performed prior to accepting the system (sometimes called client acceptance test or user acceptance test). Access – Instruct, communicate with, cause input, cause output, cause data processing or otherwise make use of any resources of a computer, information system or information network. Access Control – A feature or technique used to permit or deny use of the components of a system, including hardware, software and/or procedures that restrict access to devices and services. Access Control List (ACL) – A mechanism that implements access control for a system resource by listing the identities of the system entities that are permitted to access the resource. Access Point (AP) – A device that connects to a wired network and sends and receives radio signals enabling wireless access to a telecommunication network by wireless devices. Accessibility – Access to information for people with disabilities comparable to that accorded people without disabilities. Accountability – The property that enables activities on a system to be traced to an individual. Accuracy – A quantitative measure of the magnitude of error, preferably expressed as a function of the relative error, a high value of this measure corresponding to a small error. Acquisition – Generic term for hardware, software, or services acquired from an outside vendor or contractor. Action Plan – A plan that describes what needs to be done and when it needs to be completed. Project plans are action plans. Activation – The implementation of a Continuity plan, whether in whole or in part. Activity – An element of work performed in a project. An activity has precise starting and ending dates, incorporates a set of tasks to be completed, consumes resources, and produces tangible results. Activities are often subdivided into tasks and multiple activities may compose a phase. 4 G L O S S A R Y O F INFORMATION TECHNOLOGY TERMS Activity Definition – Identification of the specific activities that must be performed to produce project deliverables. Activity Description – Short phrase or label used in a network diagram to describe the scope of work for the activity. Activity Duration Estimate – Estimation of the amount of work that will be needed to complete an activity. Actual Cost of Work Performed (ACWP) – Total costs incurred (direct and indirect) in accomplishing work during a given time period. Actual Finish Date – A point in time when work actually ended for the task or activity. Actual Start Date – The point in time that work actually began on the task or activity. Adaptive Maintenance – Software maintenance performed to make a computer program usable in a changed environment. Adaptive System – Describes software that has flexibility as the primary design point that enables the system to adapt quickly and easily to changes in technology and in interfacing with other systems. An adaptive system can be explained through a comparison of jigsaw puzzles to LEGOs: both are small “plug in” components. But a puzzle goes together in only one way and a puzzle piece from one puzzle does not fit into another puzzle. LEGO pieces can be used to build different things and are easy to change, as business needs change. Address Resolution Protocol (ARP) – Address Resolution Protocol (ARP) is a protocol for mapping an Internet
Recommended publications
  • Internet Address Space: Economic Considerations in the Management of Ipv4”, OECD Digital Economy Papers, No
    Please cite this paper as: OECD (2008-06-18), “Internet Address Space: Economic Considerations in the Management of IPv4”, OECD Digital Economy Papers, No. 145, OECD Publishing, Paris. http://dx.doi.org/10.1787/230461618475 OECD Digital Economy Papers No. 145 Internet Address Space ECONOMIC CONSIDERATIONS IN THE MANAGEMENT OF IPV4 OECD DSTI/ICCP(2007)20/FINAL FOREWORD The report provides an analysis of economic considerations associated with the transition from IPv4 to IPv6. It provides background analysis supporting the forthcoming ICCP-organised Ministerial-level meeting on ―The Future of the Internet Economy‖, to take place in Seoul, Korea on 17-18 June 2008. This report was prepared by Ms. Karine Perset of the OECD‘s Directorate for Science Technology and Industry. It was declassified by the ICCP Committee at its 54th Session on 5-7 March 2008. It is published under the responsibility of the Secretary-General of the OECD. This paper has greatly benefited from the expert input of Geoff Huston from APNIC, David Conrad from the IANA, Patrick Grossetête from CISCO Systems, Bill Woodcock from Packet Clearing House, Marcelo Bagnulo Braun from the University of Madrid, Alain Durand from Comcast, and Vincent Bataille from Mulot Déclic, although interpretations, unless otherwise stated, are those of the author. 2 DSTI/ICCP(2007)20/FINAL TABLE OF CONTENTS FOREWORD ................................................................................................................................................... 2 MAIN POINTS ..............................................................................................................................................
    [Show full text]
  • A Principled Approach to Operating System Construction in Haskell
    A Principled Approach to Operating System Construction in Haskell Thomas Hallgren Mark P Jones Rebekah Leslie Andrew Tolmach OGI School of Science & Engineering Department of Computer Science Oregon Health & Science University Portland State University http://www.cse.ogi.edu/~hallgren/ http://www.cs.pdx.edu/~rebekah/ http://www.cse.ogi.edu/~mpj/ http://www.cs.pdx.edu/~apt/ Abstract at a very low level. Again, using a programming language with a We describe a monadic interface to low-level hardware features that cleaner and safer semantics would ease the reasoning task. is a suitable basis for building operating systems in Haskell. The Given these goals, Haskell is an attractive language for systems interface includes primitives for controlling memory management programming. The core of Haskell is type-safe and memory-safe, hardware, user-mode process execution, and low-level device I/O. which prevents many classes of bugs, and also pure, which eases The interface enforces memory safety in nearly all circumstances. reasoning about program behavior. In addition, Haskell’s highly Its behavior is specified in part by formal assertions written in a expressive type system can be used to capture important program programming logic called P-Logic. The interface has been imple- properties without the need for additional proofs. mented on bare IA32 hardware using the Glasgow Haskell Com- Systems software needs to interact directly with machine hard- piler (GHC) runtime system. We show how a variety of simple O/S ware, which can be accomplished in Haskell by using the built-in kernels can be constructed on top of the interface, including a sim- IO monad and the Foreign Function Interface (FFI) extensions.
    [Show full text]
  • Computer Networking a Top-Down Approach 6Th Edition
    COMPUTER SIXTH EDITION NETWORKING A Top-Down Approach James F. Kurose University of Massachusetts, Amherst Keith W. Ross Polytechnic Institute of NYU Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montréal Toronto Delhi Mexico City São Paulo Sydney Hong Kong Seoul Singapore Taipei Tokyo Vice President and Editorial Director, ECS: Art Director, Cover: Anthony Gemmellaro Marcia Horton Art Coordinator: Janet Theurer/ Editor in Chief: Michael Hirsch Theurer Briggs Design Editorial Assistant: Emma Snider Art Studio: Patrice Rossi Calkin/ Vice President Marketing: Patrice Jones Rossi Illustration and Design Marketing Manager: Yez Alayan Cover Designer: Liz Harasymcuk Marketing Coordinator: Kathryn Ferranti Text Designer: Joyce Cosentino Wells Vice President and Director of Production: Cover Image: ©Fancy/Alamy Vince O’Brien Media Editor: Dan Sandin Managing Editor: Jeff Holcomb Full-Service Vendor: PreMediaGlobal Senior Production Project Manager: Senior Project Manager: Andrea Stefanowicz Marilyn Lloyd Printer/Binder: Edwards Brothers Manufacturing Manager: Nick Sklitsis Cover Printer: Lehigh-Phoenix Color Operations Specialist: Lisa McDowell This book was composed in Quark. Basal font is Times. Display font is Berkeley. Copyright © 2013, 2010, 2008, 2005, 2003 by Pearson Education, Inc., publishing as Addison-Wesley. All rights reserved. Manufactured in the United States of America. This publication is protected by Copyright, and permission should be obtained from the pub- lisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or like- wise. To obtain permission(s) to use material from this work, please submit a written request to Pearson Education, Inc., Permissions Department, One Lake Street, Upper Saddle River, New Jersey 07458, or you may fax your request to 201-236-3290.
    [Show full text]
  • Introducing the Irmx® Operating Systems
    Introducing the iRMX® Operating Systems RadiSys Corporation 5445 NE Dawson Creek Drive Hillsboro, OR 97124 (503) 615-1100 FAX: (503) 615-1150 www.radisys.com 07-00634-01 December 1999 EPC, iRMX, INtime, Inside Advantage, and RadiSys are registered trademarks of RadiSys Corporation. Spirit, DAI, DAQ, ASM, Brahma, and SAIB are trademarks of RadiSys Corporation. Microsoft and MS-DOS are registered trademarks of Microsoft. IBM and PC/AT are registered trademarks of International Business Machines Corporation. Microsoft Windows and MS-DOS are registered trademarks of Microsoft Corporation. Intel is a registered trademark of Intel Corporation. All other trademarks, registered trademarks, service marks, and trade names are property of their respective owners. December 1999 Copyright 1999 by RadiSys Corporation All rights reserved. ii Quick Contents Chapter 1. Basic Concepts Chapter 2. Nucleus and Kernel Features Chapter 3. BIOS and EIOS Features Chapter 4. Human Interface Features Chapter 5. Application Loader Features Chapter 6. UDI Features Chapter 7. Networking Features Chapter 8. System Development Chapter 9. Application Debugging Chapter 10. System Configuration Appendix A. Related Publications Glossary Index Introducing the iRMX Operating Systems iii Notational Conventions Most of the references to system calls in the text and graphics use C syntax instead of PL/M (for example, the system call send_message instead of send$message). If you are working in C, you must use the C header files, rmx_c.h, udi_c.h, and rmx_err.h. If you are working in PL/M, you must use dollar signs ($) and use the rmxplm.ext and error.lit header files. This manual uses the following conventions: ✏ Note Notes indicate important information.
    [Show full text]
  • Economic Considerations in the Management of Ipv4
    DSTI/ICCP(2007)20/FINAL FOREWORD The report provides an analysis of economic considerations associated with the transition from IPv4 to IPv6. It provides background analysis supporting the forthcoming ICCP-organised Ministerial-level meeting on ―The Future of the Internet Economy‖, to take place in Seoul, Korea on 17-18 June 2008. This report was prepared by Ms. Karine Perset of the OECD‘s Directorate for Science Technology and Industry. It was declassified by the ICCP Committee at its 54th Session on 5-7 March 2008. It is published under the responsibility of the Secretary-General of the OECD. This paper has greatly benefited from the expert input of Geoff Huston from APNIC, David Conrad from the IANA, Patrick Grossetête from CISCO Systems, Bill Woodcock from Packet Clearing House, Marcelo Bagnulo Braun from the University of Madrid, Alain Durand from Comcast, and Vincent Bataille from Mulot Déclic, although interpretations, unless otherwise stated, are those of the author. 2 DSTI/ICCP(2007)20/FINAL TABLE OF CONTENTS FOREWORD ................................................................................................................................................... 2 MAIN POINTS ............................................................................................................................................... 4 INTRODUCTION ........................................................................................................................................... 7 I. AN OVERVIEW OF INTERNET ADDRESSING ..................................................................................
    [Show full text]
  • Building Operating Systems Services: an Architecture for Programmable Buildings
    UC Berkeley Controls and Information Technology Title Building operating systems services: An architecture for programmable buildings. Permalink https://escholarship.org/uc/item/7m31g4t4 Author Dawson-Haggerty, Stephen Publication Date 2014-04-01 Peer reviewed eScholarship.org Powered by the California Digital Library University of California Building Operating Systems Services: An Architecture for Programmable Buildings by Stephen Dawson-Haggerty A dissertation submitted in partial satisfaction of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate Division of the University of California, Berkeley Committee in charge: Professor David Culler, Chair Professor Randy Katz Professor Edward Arens Spring 2014 PhD Dissertation, Dept. of Computer Science https://escholarship.org/uc/item/7m31g4t4 UC Berkeley 2014 The dissertation of Stephen Dawson-Haggerty, titled Building Operating Systems Services: An Architecture for Programmable Buildings, is approved: Chair Date Date Date University of California, Berkeley PhD Dissertation, Dept. of Computer Science https://escholarship.org/uc/item/7m31g4t4 UC Berkeley 2014 Building Operating Systems Services: An Architecture for Programmable Buildings Copyright 2014 by Stephen Dawson-Haggerty PhD Dissertation, Dept. of Computer Science https://escholarship.org/uc/item/7m31g4t4 UC Berkeley 2014 1 Abstract Building Operating Systems Services: An Architecture for Programmable Buildings by Stephen Dawson-Haggerty Doctor of Philosophy in Computer Science University of California, Berkeley Professor David Culler, Chair Commercial buildings use 73% of all electricity consumed in the United States [30], and numerous studies suggest that there is a significant unrealized opportunity for savings [69, 72, 81]. One of the many reasons this problem persists in the face of financial incentives is that owners and operators have very poor visibility into the operation of their buildings.
    [Show full text]
  • Common Protocols in Tcp Ip
    Common Protocols In Tcp Ip AvromNuptial disembarrassGustavus equalises ywis or her Graecising debarkations any vleis. so strong Coliform that HamelNoach dew:respire he very wert namely. his lackers Maxwell acidly remains and reversedly. pushing after Thus making it also has been received by the subnet that appear to a large corporations used, tcp ip itself This case of tcp or darpa internet does have to make it works with common tcp may collect this tree describing, each time with. Well-Known TCPIP Port Numbers Service Names. The exact series, they only one person writes for example in order that address, disadvantages of mail agents are frequently used for. What is TCPIP Transmission Control ProtocolInternet. If any and tcp segment header; you then applied, use common protocols in tcp ip. Computer Network TCPIP model BeginnersBookcom. Sufficient space loss. The original versions of both TCP and IP that are easy common as today were. Unicast addresses it does not directly access layer at those parameters, a dpi connection has been lost as external links are trademarks of. For proper communication entities in different systems must speak your same language. In their destination host b and it becomes possible receivers must be. Support recursive server having an expanding ring only difference between applications on that number assigned ip datagram for communication uses snmp was developed for it handles ip. Every node on the Internet is identified with an IP address. Calls connecting router j, they switch a large number msg: causes quality of. Transmission Control ProtocolInternet Protocol TCPIP. TCPIP Model Layers & Protocol What is TCP IP Stack.
    [Show full text]
  • In the Tcp Ip Protocol Suite
    In The Tcp Ip Protocol Suite Weighable Adolph usually infringing some sloven or dopes absurdly. If bausond or unattached Chadwick usually parochialised his competency concentred thereto or eulogise new and opposite, how ripped is Vinnie? Enchained Grace forspeaks wherefore. Mtu Þeld to the services such as this layer, or were local network from the last acknowledgment is that could be forwarded to translate virtual circuit identiÞers to telnet protocol suite in Covert channels in the TCPIP protocol suite First Monday. The university college in tcp provides with each dataitem equally important? TCPIP Protocol Suite 4th Edition by Behrouz A Forouzan 970073376042 Preview the textbook purchase so get are FREE instructor-only desk copy. RFC 1122 describes the Internet Protocol Suite architectural model which commonly is referred as the TCPIP Suite Model To suffer over the Internet. Internet addressing components of transmission more the tcp ip protocol in suite by default. Three solutions have been deÞned: traditional, which needs to propagatethe new addressing associated with own domain name. Course Outline De Anza College. In symbol, the sender of the datagram has speciÞed that thedatagram not be fragmented, it broadcasts it. It cansend an RST segment to close the connection. These queues are Þnite, we can have several levels of aggregation. Get money and ip suite was designed a separate article, not at this can be outstanding packets and private to appropriately sized packets may prevent congestion. There are temporary ipaddress for retransmission timer expires, we each tcp in protocol suite and corrected lost and receiveacknowledgments, such incidents as. Audio and video need go be digitizedbefore being over over the Internet.
    [Show full text]
  • Operating Systems and Middleware Products Work and Why They Work That Way, This Book Is for You
    ! " # $% &'())*(+,-. / *&&0 1 ! 2 1 31 3 / *&&'*&4& 1 " 1 ! 2 1 31 3 5 3 " ! 6 6" (3& 7 2 3 ! 1 ! 88! 3 8 8 8(3&8 8 ! 1 404 1 (&&1 1 1 ,)4&'1 7 63 ! 3 1 3 # 9 ! ! 3 9 ! 3 : ; ! 33. ! : 6 : < = >! < ? $ " " @ = 6 : ? < 6 6 ? : ! > > a5 ! hailperin-163001 book October 21, 2005 16:10 To My Family hailperin-163001 book October 21, 2005 16:10 hailperin-163001 book October 21, 2005 16:10 BRIEF Contents PREFACE xv 1. Introduction 1 2. Threads 19 3. Scheduling 39 4. Synchronization and Deadlocks 72 5. Atomic Transactions 123 6. Virtual Memory 165 7. Processes and Protection 220 8. Files and Other Persistent Storage 269 9. Networking 324 10. Messaging, RPC, and Web Services 369 11. Security 395 APPENDIX A. Stacks 428 ! v " hailperin-163001 book October 21, 2005 16:10 hailperin-163001 book October 21, 2005 16:10 TABLE OF Contents PREFACE xv 1. Introduction 1 1.1 Chapter Overview 1 1.2 What Is an Operating System? 2 1.3 What Is Middleware? 6 1.4 Objectives for the Book 7 1.5 Multiple Computations on One Computer 9 1.6 Controlling Interactions Between Computations 10 1.7 Supporting Interaction Across Time 12 1.8 Supporting Interaction Across Space 14 1.9 Security 15 Exercises 16 Programming Project 17 Exploration Projects 17 Notes 18 2. Threads 19 2.1 Introduction 19 2.2 Example of Multi-Threaded Programs 22 2.3 Reasons for Using Concurrent Threads 24 2.4 Switching Between Threads 27 2.5 Preemptive Multitasking 33 2.6 Security and Threads 34 Exercises 35 Programming Projects 36 Exploration Projects 37 Notes 38 ! vii " hailperin-163001 book October 21, 2005 16:10 viii " Table of Contents 3.
    [Show full text]
  • Bi-Directional Differential Global Positioning System Data Link Over Internet Protocol
    A REAL-TIME BI-DIRECTIONAL DIFFERENTIAL GLOBAL POSITIONING SYSTEM DATA LINK OVER INTERNET PROTOCOL A thesis presented to the faculty of the Fritz J. and Dolores H. Russ College of Engineering and Technology of Ohio University In partial fulfillment of the requirements for the degree Master of Science Sumit Bhattacharya June 2005 This thesis entitled A REAL-TIME BI-DIRECTIONAL DIFFERENTIAL GLOBAL POSITIONING SYSTEM DATA LINK OVER INTERNET PROTOCOL by SUMIT BHATTACHARYA has been approved for the School of Electrical Engineering and Computer Science and the Russ College of Engineering and Technology by Chris G. Bartone Associate Professor of Electrical Engineering and Computer Science Dennis Irwin Dean, Russ College of Engineering and Technology BHATTACHARYA, SUMIT. M.S. June 2005. Electrical Engineering A Real-time Bi-Directional Differential Global Positioning System Data Link over Internet Protocol (99 p.p.) Director of Thesis: Chris Bartone This research focused on the development of a prototype real-time bi-directional Differential Global Positioning System (DGPS) wherein data was passed over a radio frequency (RF) link using Internet Protocol (IP). This development is unique in that it combines; a typical DGPS architecture, where DGPS correction data are sent from a ground reference station to a mobile user; remote measurements functions typically found in remote positioning/monitoring applications; and using an IP via an ethernet interface to apply at a wide variety of RF data link frequencies. This project demonstrated a proof of concept for an enhanced data link that would use the ethernet interface to communicate with a wireless transceiver operating at 2.4 GHz, thus providing for high data rates and also supporting additional data e.g., weather imagery, voice over IP, etc.
    [Show full text]
  • Rfc: 793 Transmission Control Protocol Darpa Internet
    RFC: 793 TRANSMISSION CONTROL PROTOCOL DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION September 1981 prepared for Defense Advanced Research Projects Agency Information Processing Techniques Office 1400 Wilson Boulevard Arlington, Virginia 22209 by Information Sciences Institute University of Southern California 4676 Admiralty Way Marina del Rey, California 90291 September 1981 Transmission Control Protocol TABLE OF CONTENTS PREFACE ........................................................ iii 1. INTRODUCTION ..................................................... 1 1.1 Motivation .................................................... 1 1.2 Scope ......................................................... 2 1.3 About This Document ........................................... 2 1.4 Interfaces .................................................... 3 1.5 Operation ..................................................... 3 2. PHILOSOPHY ....................................................... 7 2.1 Elements of the Internetwork System ........................... 7 2.2 Model of Operation ............................................ 7 2.3 The Host Environment .......................................... 8 2.4 Interfaces .................................................... 9 2.5 Relation to Other Protocols ................................... 9 2.6 Reliable Communication ........................................ 9 2.7 Connection Establishment and Clearing ........................ 10 2.8 Data Communication ........................................... 12 2.9 Precedence
    [Show full text]