Investigative Data Mining for Security and Criminal Detection
- Active Attack
-
An attack that results in an unauthorized state change, such as the manipulation of files or the adding of unauthorized files.
- Administrative Security
-
The management constraints and supplemental controls established to provide an acceptable level of protection for data.
- AIS
-
Automated Information System—any equipment of an interconnected system or subsystem that is used in the automatic acquisition, storage, manipulation, control, display, transmission, or reception of data; includes software, firmware, and hardware,
- Alert
-
A formatted message describing a circumstance relevant to network security. Alerts are often derived from critical audit events.
- Ankle-Biter
-
A person who aspires to be a hacker/cracker, but has very limited knowledge or skills related to AISs; usually associated with young teens who collect and use simple malicious programs obtained from the Internet.
- Anomaly Detection Model
-
A model where intrusions are detected by looking for activity that is different from the user's or system's normal behavior.
- Application Level Gateway
-
A firewall system in which service is provided by processes that maintain complete TCP connection state and sequencing. Application level firewalls often re-address traffic so that outgoing traffic appears to have originated from the firewall, rather than the internal host.
- ASIM
-
Automated Security Incident Measurement—Monitors network traffic and collects information on targeted unit networks by detecting unauthorized network activity.
- Assessment
-
Surveys and inspections; an analysis of the vulnerabilities of an AIS. An information acquisition and review process designed to assist a customer in determining how best to use resources to protect information in systems.
- Assurance
-
A measure of confidence that the security features and architecture of an AIS accurately mediate and enforce the security policy.
- Attack
-
An attempt to bypass security controls on a computer. The attack may alter, release, or deny data. Whether an attack will succeed depends on the vulnerability of the computer system and the effectiveness of existing countermeasures.
- Audit
-
The independent examination of records and activities to ensure compliance with established controls, policies, and operational procedures, and to recommend any indicated changes in controls, policy, or procedures.
- Audit Trail
-
In computer security systems, a chronological record of system-resource usage. This includes user login, file access, various other activities, and whether any actual or attempted security violations occurred, both legitimate and unauthorized.
- Authenticate
-
To establish the validity of a claimed user or object.
- Authentication
-
To positively verify the identity of a user, device, or other entity in a computer system, often as a prerequisite to allowing access to resources in a system.
- Authentication Header (AH)
-
A field that immediately follows the IP header in an IP datagram and provides authentication and integrity checking for the datagram.
- Automated Security Monitoring
-
All security features needed to provide an acceptable level of protection for hardware, software, and classified, sensitive, unclassified, or critical data, material, or processes in the system.
- Availability
-
Assuring information and communications services will be ready for use when expected.
[A]
Категории