Question of the Week
A network worm.
A series of notes about the Internet, started in 1969 (when the Internet was the ARPANET). An Internet Document can be submitted to the IETF by anyone, but the IETF decides if the document becomes an RFC. Eventually, if it gains enough interest, it may evolve into an Internet standard.
A security mechanism that uses a cryptographic hash function to generate a sequence of 64-bit, one-time passwords for remote user login. The client generates a one-time password by applying the MD4 cryptographic hash function multiple times to the user’s secret key. For each successive authentication of the user, the number of hash applications is reduced by one.
A threat assessment is the identification of types of threats that an organization might be exposed to.
User contingency plan is the alternative methods of continuing business operations if IT systems are unavailable.
Voice IPS is a security management system for voice networks which monitors voice traffic for multiple calling patterns or attack/abuse signatures to proactively detect and prevent toll fraud, Denial of Service, telecom attacks, service abuse, and other anomalous activity.
A security protocol for wireless local area networks defined in the standard IEEE 802.11b.
The “Day Zero” or “Zero Day” is the day a new vulnerability is made known. In some cases, a “zero day” exploit is referred to an exploit for which no patch is available yet. (“day one” – day at which the patch is made available).
What is MSSP? This term reflects partners who have identified themselves as having security expertise as a Managed Security Services Provider (MSSP).