bastion host
A single point of contact between the Internet and a private network.
blacklist
A list of IP addresses, URLs, keywords, or other items that are disallowed. When a blacklist is used, everything not on the blacklist is allowed. This is sometimes called a deny list.
circuit level gateway firewall
A firewall that authenticates each user before granting access.
DMZ
Demilitarized Zone, a firewall type that consists of two firewalls with an intermediate zone between them.
DoS
Denial of Service, an attack that prevents legitimate users from accessing a resource.
dual-homed host
A type of firewall that literally has two NICs.
firewall
A barrier between the network and the outside world.
open source
Software where the source code itself is freely available to the public.
operating system hardening
The process of securing an individual operating system. This includes proper configuration and applying patches.
packet filter firewall
A firewall that scans incoming packets and either allows them to pass or rejects them.
packet sniffer
Software that intercepts packets and copies their contents.
proxy server
A device that hides your internal network form the outside world.
screened host
A combination of firewalls; in this configuration, you use a combination of bastion host and a screening router.
whitelist
A list of IP addresses, URLs, characters, and so on that are allowed. When a whitelist is used, only those items on the whitelist are allowed; everything else is blocked. This is sometimes called an allow list.
access control
The process of limiting access to some resource only to authorized users, programs, or systems.
auditing
A check of a system’s security, usually including a review of documents, procedures, and system configurations.
authenticate
The process of verifying that a user is authorized to access some resource.
binary numbers
Numbers that use the base 2 number system.
black hat hacker
A hacker with a malicious purpose, synonymous cracker.
blocking
The act of preventing transmissions of some type.
breach
To successfully break into a system (e.g., “to breach the security”).
buffer overflow
An attack that seeks to overwrite a memory buffer with more data that it is designed to hold.
dynamic security approach
An approach to security that is proactive rather than reactive.
ethical hacker
One who hacks into systems in order to accomplish some goal that he or she feels is ethically valid.