1 Terminology and abbreviations

1.1 Terminology

Throughout this unit I shall use the terms ‘vulnerability’, ‘threat’ and ‘attack’. It is worthwhile clarifying these terms before proceeding:

  • A vulnerability is a component that leaves a system open to exploitation (e.g. a network cable or a protocol weakness).
  • A threat indicates the potential for a violation of security.
  • The term attack is applied to an attempted violation.

When you have finished studying this unit you should be able to explain the meaning of all the terms listed below:

active attack

application layer encryption

application level gateway

asymmetric key system

attack

authentication

availability

bastion host

block cipher

brute force attack

Caesar cipher

certification authority

ciphertext

circuit level gateway

collision-free

confidentiality

cryptanalysis

cryptography

cryptosystem

decryption

demilitarised zone

denial-of-service attacks

digital signature

encryption

end-to-end encryption

filtering rules

firewall

freshness

hash value

integrity

key

keyspace

keystream

link layer encryption

masquerade attack

message authentication code

message digest

message modification

message replay

network layer encryption

nonce

one-time pad

one-way hash function

passive attack

password

password cracker

plaintext

private key

protocol analyser

proxy server

public key

public key infrastructure

public key system

registration authority

screened sub-net

sequence number

session key

shared key system

sniffer

stream cipher

symmetric key system

threat

time stamp

traffic analysis

Trojan

virus

vulnerability

worm

These terms will be highlighted in bold throughout the unit.

Last modified: Thursday, 2 August 2012, 12:30 PM