Previous Page | Next Page

  1. Introduction
  2. Your Needs
  3. What to Protect
  4. Security Policies
  5. Security Policy Requirements
  6. Incident Procedures
  7. Security Categories
  8. Software Vulnerability Control
  9. Hostile Software
  10. Network Layout
  11. Traffic Filtering
  12. Mail
  13. Firewall Protection
  14. Network Intrusion Detection
  15. Network Port Scanning
  16. Network Tools
  17. Passwords
  18. Types of Attacks
  19. Protocol Use
  20. Entry Points
  21. Cost
  22. Application Level Protection
  23. System Protection
  24. User Issues
  25. Other Recommendations
  26. Terms
  27. Credits

Security Terms

  • Ciphertext - Text or data that has been enciphered such that unauthorized persons should be unable to read it.
  • Cipher - A mathematical function that is used to perform encryption or decryption.
  • Cryptoanalysis - The practice of analyzing ciphertext with the intent of breaking it.
  • Cryptography - Science dealing with keeping messages secure.
  • Cryptology - The section of mathematics that deals with cryptography and cryptoanalysis.
  • Decipher - The act of taking text that is enciphered so unauthorized persons cannot read it and processing it into plain text or data that can be read or used.
  • Decryption - The process of turning an encrypted message (ciphertext) back into plaintext.
  • Encipher - The act of taking plain text or data nnd processing it into ciphertext so unauthorized personnel cannot read it or use it.
  • Encryption - The process of hiding the contents of a message.
  • One way hash functions - A function that can be easily performed one way but is difficult or impossible to reverse.
  • Plaintext - Normal text or data, before the enciphering process or after the deciphering process.
  • Salting - Adding random data to a password prior to performing a one way hash on it. This is a means of stopping a dictionary attack.