- Addressing In the context of computer networks, addressing refers to the assignment of a unique identifier to each device or destination on the network. This identifier, also known as an IP address, allows devices to communicate with each other and route data packets to their intended destination. Examples of addressing include the use of IP addresses in the Internet Protocol (IP) to identify computers on the Internet and the use of MAC addresses in local area networks (LANs) to identify individual network devices.
- Address Resolution Protocol (ARP) a networking protocol that maps a network's logical IP address to its physical MAC address. It is used to enable communication between devices on a network. Examples include ARP requests, and ARP replies in the process of resolving an IP address to a MAC address.
- Address space The range of addresses that can be assigned to devices on a network. Address space refers to the range of IP addresses that can be assigned to devices on a network, including both IPv4 and IPv6 addresses. This is used in networking to ensure that each device on the network has a unique address and can communicate with other devices. It is used to identify and locate devices on a network.
- Address Space Layout Randomization (ASLR) A security technique that randomly arranges the positions of key data areas of a program—including the base of the executable and position of libraries, heap, and stack—in a process's address space. By doing so, it makes it harder for an attacker to predict target addresses, thus mitigating the risk of exploitation techniques such as buffer overflow attacks. ASLR is widely used in modern operating systems to enhance their security posture.
- Adequate Security The level of security considered sufficient to protect an information system, data, or network from unacceptable losses or damage. This typically involves a balance between the potential harm caused by a security incident and the cost and effort of implementing security measures. Adequate security is often defined by regulatory requirements, industry standards, or an organization's risk tolerance and may vary depending on the nature of the assets being protected and the threat landscape.
- Ad Hoc Mode A wireless network mode where devices connect directly to each other without the use of a central access point. It is used in situations where a temporary network is needed, such as a group of friends sharing files at a party. Examples include Wi-Fi Direct, Bluetooth, and peer-to-peer networking.
- Administrative Controls Policies and procedures implemented by an organization to manage and regulate user behavior and system operation. These include security policies, operating procedures, rules of behavior, and personnel controls, among others. Administrative controls are a vital part of an organization's overall security strategy, serving to guide the appropriate use and handling of resources, define roles and responsibilities, and establish processes for monitoring, incident response, and recovery. They complement technical and physical controls to create a multi-layered defense against security threats.
- Admissible evidence Any evidence that is legally permitted to be used in a court of law. It must be relevant, reliable, and obtained in a manner that follows the rules of evidence. Admissible evidence is typically used in criminal and civil trials to prove the guilt or innocence of a defendant. Examples of admissible evidence include eyewitness testimony, physical evidence, and expert witness testimony. In IT, it must be gathered and preserved following proper digital forensic procedures to maintain its integrity and authenticity. Examples include logs, digital documents, emails, and digital forensics reports.
- Advanced Encryption Standard (AES) A widely used symmetric encryption standard adopted by the U.S. government and numerous organizations worldwide. It operates on blocks of data and uses a secret key that can be 128, 192, or 256 bits in length. With its strong security properties and efficient performance, AES is an integral part of many protocols and systems for securing data in transit and at rest, making it a fundamental element in safeguarding sensitive information against unauthorized access.
- Advanced Persistent Threat (APT) A sophisticated, systematic, and long-term cyberattack campaign that targets specific entities with the intent to steal information or disrupt operations. APTs are typically conducted by nation-states or state-sponsored groups and are characterized by their stealth and persistence. These attackers use a variety of techniques to gain access to a network, maintain a foothold, and exfiltrate data without being detected over extended periods. APTs require a high degree of expertise and resources to conduct and are considered a significant threat to national security, large corporations, and critical infrastructure.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.