sans.org

Website:http://www.sans.org
Upvotes received17
Downvotes received19
Karma:-3 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (448)

1

5 Thumbs up   4 Thumbs down

encryption


Cryptographic transformation of data (called "plaintext") into a form (called "cipher text") that conceals the data's original meaning to prevent it from b [..]
Source: sans.org

2

2 Thumbs up   2 Thumbs down

jump bag


A Jump Bag is a container that has all the items necessary to respond to an incident inside to help mitigate the effects of delayed reactions.
Source: sans.org

3

2 Thumbs up   2 Thumbs down

malware


A generic term for a number of different types of malicious code.
Source: sans.org

4

2 Thumbs up   1 Thumbs down

straight-through cable


A straight-through cable is where the pins on one side of the connector are wired to the same pins on the other end. It is used for interconnecting nodes on the network.
Source: sans.org

5

1 Thumbs up   1 Thumbs down

hops


A hop is each exchange with a gateway a packet takes on its way to the destination.
Source: sans.org

6

1 Thumbs up   1 Thumbs down

hyperlink


In hypertext or hypermedia, an information object (such as a word, a phrase, or an image; usually highlighted by color or underscoring) that points (indicates how to connect) to related information th [..]
Source: sans.org

7

1 Thumbs up   4 Thumbs down

issue-specific policy


An Issue-Specific Policy is intended to address specific needs within an organization, such as a password policy.
Source: sans.org

8

1 Thumbs up   0 Thumbs down

measures of effectiveness


Measures of Effectiveness is a probability model based on engineering concepts that allows one to approximate the impact a give action will have on an environment. In Information warfare it is the abi [..]
Source: sans.org

9

1 Thumbs up   1 Thumbs down

public-key forward secrecy


For a key agreement protocol based on asymmetric cryptography, the property that ensures that a session key derived from a set of long-term public and private keys will not be compromised if one of th [..]
Source: sans.org

10

1 Thumbs up   0 Thumbs down

qaz


A network worm.
Source: sans.org


To view all 448 definitions, please sign in.