National Webcast Initiative Cyber Security Webcast, June 22, 2004 DEFINITIONS OF SECURITY TERMS The following definitions are provided as a resource to help familiarize you with some common security terms and phrases that you will hear during the broadcast of the June 22, 2004 webcast. The information provided below is by no means an exhaustive list, however, it can be utilized as a foundation from which you can build your knowledge of cyber security terms and further pursue these topics on your own. Backdoor: (also called a trapdoor) An Hash: Producing hash values for undocumented way of gaining access to a program, online service or an entire computer system. The backdoor is written by the programmer who creates the code for the program. accessing data or for security. A hash value (or simply hash), also called a message digest, is a number generated from a string of text. The hash is substantially smaller than the text itself, and is generated by a formula in such a way that it is extremely unlikely that some other text will produce the same hash value. CIA: Confidentiality . ensuring that only authorized users can access the services and information . ensuring that authorized users can access only the services for which they are authorized Integrity . ensuring that you can recognize and recover from breaches of integrity Availability . . ensuring that services are uninterrupted even when there are hardware or software failures or during routine system maintenance ensuring that you can recognize and recover from security incidents in a timely manner DoS: Short for denial-of-service attack, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. For all known DoS attacks, there are software fixes that system administrators can install to limit the damage caused by the attacks. Hashing is also a common method of accessing data records. To create an index, called a hash table, for these records, you would apply a formula to each name to produce a unique numeric value. P2P - Peer-to-Peer Infrastructure: Often referred to simply as peer-to-peer, or abbreviated P2P, a type of network in which each workstation has equivalent capabilities and responsibilities. This differs from client/server architectures, in which some computers are dedicated to serving the others. Peer-to-peer networks are generally simpler, but they usually do not offer the same performance under heavy loads. Password Cracker: A password cracker is an application program that is used to identify an unknown or forgotten password to a computer or network resources. It can also be used to help a person obtain unauthorized access to a resource. Password entropy: Stated in bits, the measure of randomness in a password. Rainbow Tables: A set of tools and techniques used for cracking MS Windows passwords. Rootkits: Page 1 Webopedia (http://www.pcwebopedia.com/) was used as a source for some of the definitions contained herein. National Webcast Initiative Cyber Security Webcast, June 22, 2004 DEFINITIONS OF SECURITY TERMS The following definitions are provided as a resource to help familiarize you with some common security terms and phrases that you will hear during the broadcast of the June 22, 2004 webcast. The information provided below is by no means an exhaustive list, however, it can be utilized as a foundation from which you can build your knowledge of cyber security terms and further pursue these topics on your own. . User-Level RootKits—Programs that 'infect' program files that are executed by the user and run under the user account's privileges (for example, the Explorer.exe or Word.exe program) . Kernel-Level RootKits—Programs that 'infect' functions belonging to the Operating System kernel (i.e. the core Windows operating system) and are used by hundreds of applications (including the Windows API). KernelMode RootKits will modify (i.e. hijack) internal operating system functions that return lists of files, processes, and open ports (use the 'DependencyWalker' program to see Kernel functions on the 'NTDLL.dll', 'Kerner32.dll', and 'NTOSKRNEL.exe' files) should be noted that the majority of shareware and freeware applications do not come with spyware. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers. Also known as "adware." Trojan Horse: A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer. Vector: Also known as "attack vector" Social engineering: An attack which is used to trick people into revealing passwords or other information that can compromise security. These types of attack are low-tech and can be done just by talking to someone in the organization (phone call, email or a visit). For example, a person could call a busy receptionist and tell her that they are a company salesperson who is stranded at a customer's site. They are trying to do a demo, but can't get their password to work, and ask her for her password so they can get the demo going and not lose the account. Spyware: Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet; however, it routes or methods used to get into computer systems, usually for nefarious purposes. They take advantage of known weak spots to gain entry. Many attack vectors take advantage of the human element in the system, because that's often the weakest link. Virus: A program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are manmade. Some people distinguish between general viruses and worms. A worm is a special type of virus that can replicate itself and use memory, but cannot attach itself to other programs. Warez: Pronounced wayrz or wayrss. Commercial software that has been pirated and made available to the public via an electronic Bulletin Board System (BBS) or Page 2 Webopedia (http://www.pcwebopedia.com/) was used as a source for some of the definitions contained herein. National Webcast Initiative Cyber Security Webcast, June 22, 2004 DEFINITIONS OF SECURITY TERMS The following definitions are provided as a resource to help familiarize you with some common security terms and phrases that you will hear during the broadcast of the June 22, 2004 webcast. The information provided below is by no means an exhaustive list, however, it can be utilized as a foundation from which you can build your knowledge of cyber security terms and further pursue these topics on your own. the Internet. Typically, the pirate has figured out a way to de-activate the copy-protection or registration scheme used by the software. Note that the use and distribution of warez software is illegal. In contrast, shareware and freeware may be freely copied and distributed. Web Defacement: Also referred to as defacement or Web site defacement, a form of malicious hacking in which a Web site is “vandalized.” Often the malicious hacker will replace the site’s normal content with a specific political or social message or will erase the content from the site entirely, relying on known security vulnerabilities for access to the site’s content. Worm: A program or algorithm that replicates itself over a computer network and usually performs malicious actions, such as using up the computer's resources and possibly shutting the system down. Worms are self contained and do not need a host application to be transported. Page 3 Webopedia (http://www.pcwebopedia.com/) was used as a source for some of the definitions contained herein.