Glossary

  • ACK: A TCP acknowledgment packet.
  • Backlog queue: Server-side queue used during incomplete TCP connection setup.
  • BCP 38: Best Current Practice for blocking spoofed source addresses with ingress filtering.
  • Bot: Malware that can receive commands from a human operator or command server.
  • Botnet: A collection of bots under coordinated control.
  • Buffer overflow: Writing beyond the memory allocated for a buffer.
  • Cache poisoning: Inserting false records into a DNS cache.
  • C&C (Command and Control): Infrastructure used to manage bots or malware.
  • Cross-Site Scripting (XSS): Injection of active script into a browser context.
  • Daemon: A continuously running service process that waits for requests.
  • DDoS: Distributed denial of service.
  • DNS: Domain Name System.
  • Half-open connection: A TCP connection for which setup has started but not completed.
  • IDS / IPS: Intrusion Detection System / Intrusion Prevention System.
  • Ingress filtering: Filtering traffic entering or leaving a network to block invalid source addresses.
  • IP spoofing: Forging the source IP address in packets.
  • Pharming: Redirecting users to malicious destinations through name-resolution manipulation.
  • Phishing: Fraudulent attempt to steal information by deception.
  • Rainbow table: Precomputed structure for reversing password hashes more efficiently.
  • Spear phishing: Targeted phishing aimed at a particular person or group.
  • SYN flood: DoS attack based on exhausting server resources during TCP setup.
  • TTL: Time To Live field used to limit how far a packet can travel.
  • Worm: Self-propagating malware that spreads from host to host.

Back to top

Educational material for undergraduate network security students.

This site uses Just the Docs, a documentation theme for Jekyll.