| A | B |
| Distributed Denial of Service Attack (DDoS) | An attack that uses hijacked computers to flood a target and overwhelm it with excess traffic. |
| Trojan Program | A piece of software that appears to perform a useful task, but secretly hides malicious functions. |
| Macro | A type of script that provides automation. |
| Botnet | Consists of many infected computers that are controlled by a single attacker. |
| Script Kiddie | Typically an unskilled programmer or attacker that makes use of commonly available exploits to attack a network. |
| Virtual Private Network (VPN) | A network that uses a public network to provide access to a secured private network. |
| Restrictive Policy | Denies all traffic on a firewall by default, only specifically allowed traffic is permitted into the network. |
| Nonrepudiation | The ability to log and trace any performed action over a secured network, preventing a participant from denying it performed an action. |
| Signatures | Used by anti-virus software and IDPSs to identify threats |
| Mandatory Access Control (MAC) | Relies on access being defined in advance by system administrators. |
| Auditing | The process of recording which computers are accessing a network and what resources are being accessed, and then recording the information in a log file. |
| Back Doors | Ways of gaining unauthorized access to a computer or other resources, such as an unused port or terminal service |
| Crackers | Hackers who break into systems with the intent of doing harm or destroying data |
| Defense in Depth (DiD) | A strategy for archiving information security that uses multiple layers of defense. |
| Hactivists | Computer attackers with political goals. |
| Integrity | The accuracy and consistency of information during its creation, transmission, and storage. |
| Logic Bomb | Malware designed to be used at a specific time in the future or when a specified condition exists. |
| Packet Filters | Hardware or software tools that allow or deny packets based on specified criteria, such as port, IP address, or protocol. |
| Port | An area in random access memory (RAM) reserved for the use of a program that "listens" for requests for the service it provides |
| Socket | A network connection consisting of a port number combined with a computer's IP address. |