Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

Page:  1  2  3  4  5  6  7  8  9  10  ...  40  (Next)



  •  IPv6 transition mechanism for migrating from Internet Protocol version 4 (IPv4) to IPv6
  • tunneling protocol that encapsulates IPv6 packets on specially configured IPv4 links according to the specifications of RFC 4213
  • IP protocol number for 6in4 is 41, per IANA reservation



  • After Action Report (AAR)
  • retrospective analysis on a given sequence of goal-oriented actions previously undertaken


  • Access Control List (ACL)
  • permissions attached to an object that specify which users are granted access to that object and the operations it is allowed to perform
  • each entry in an access control list specifies the subject and an associated operation that is permitted


  • Active Directory (AD)
  • Windows OS directory service that facilitates working with interconnected, complex and different network resources in a unified manner
  • provides a common interface for organizing and maintaining information related to resources connected to a variety of network directories
  • directories may be
    • systems-based
    • application-specific
    • network resources, like printers
  • serves as a single data store for quick data access to all users and controls access for users based on the directory's security policy


  • Android Debug Bridge  (ADB)
    • command-line tool that lets you communicate with a device
    • facilitates a variety of device actions, such as installing and debugging apps
    • provides access to a Unix shell that you can use to run a variety of commands on a device


  • Aircrack-ng
    • suite of tools that provide capabilities for conducting RF communication monitoring and wireless network security auditing
    • network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs
    • Works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic
    • Runs under Linux, FreeBSD, macOS, OpenBSD, and Windows


  • Annualized Loss Expectancy (ALE)
  • annual expected financial loss from an asset because of a particular event occurring within one year
  • ALE = ARO × SLE

Application Whitelisting

  • Application Whitelisting
    • allows only pre-approved and specified programs to run
    • any program not pre-approved is blocked by default


  • Advanced Persistent Threat (APT)
    • attacker(s) gain access to a network and remains undetected for an extended period of time
    • provide the highest level of threat on the adversary tier list
    • often sponsored by nation-states
      • well funded
      • have access to high-end technical resources and knowledge


  • Annualized Rate of Occurrence (ARO)
  • number of times that a particular event is expected to happen in one year

Page:  1  2  3  4  5  6  7  8  9  10  ...  40  (Next)