- Land Attack A type of denial of service (DoS) attack that involves sending a forged packet to a device with the same source and destination IP address and port number. As the device tries to respond to this unusual packet, it enters a loop of repeated actions that can cause the system to slow down or crash. These attacks exploit vulnerabilities in certain types of network software and can disrupt the availability of services.
- Latency The delay between the transmission and receipt of data measured in milliseconds (MS). It is used in networking to measure the speed and efficiency of data transfer. Examples -a high latency internet connection may cause slow loading times on websites, latency in a gaming server can cause lag or delay in gameplay, and latency in a financial trading system can cause delays in trade executions.
- Lattice security model A security model that defines access to resources based on a lattice-like structure of security levels and clearance rules. It is used to enforce hierarchical access control and prevent unauthorized access to sensitive information. Examples of the lattice security model include the Bell-LaPadula and Biba models.
- Layer 2 switches Network devices that operate at the data link layer (Layer 2) of the Open Systems Interconnection (OSI) model. They are responsible for forwarding data frames between devices on a local network based on the device's MAC addresses. Layer 2 switches are central to local network operation and performance, but they must be properly configured and managed to prevent potential security issues such as MAC flooding or spoofing attacks.
- Layer 2 Tunneling Protocol (L2TP) A protocol used to support virtual private networks (VPNs), which provides a private, secure path for data transmission across a public network such as the internet. L2TP creates a tunnel between two L2TP connection points and encapsulates data sent between them. While L2TP itself doesn't provide encryption, it's often used in conjunction with the IPsec protocol, which does provide encryption, to create a more secure VPN.
- Layer 3 and 4 Switches Devices that operate at both the network (Layer 3) and transport (Layer 4) layers of the OSI model. They combine the fast-switching capabilities of a Layer 2 switch with the routing capabilities of a router (Layer 3) and can also make forwarding decisions based on transport layer information (Layer 4), such as TCP or UDP port numbers. This allows for more granular control of network traffic, which can be beneficial for both network performance and security. For example, Layer 4 switching can be used to help mitigate DoS attacks by limiting traffic to certain ports.
- Layered security A security strategy that uses multiple layers of defense to protect against attacks and prevent unauthorized access. It is used to reduce the risk of a single point of failure and increase the overall security of a system. Examples of layered security include firewalls, intrusion detection systems, and access control policies.
- Leased line A telecommunications line leased for exclusive use from a communication service provider, typically used to connect geographically distant offices. Offering consistent bandwidth and higher reliability than standard connections, leased lines are ideal for businesses requiring secure, dedicated, and uninterrupted communication channels.
- Least privilege A computer security concept in which a user or program is given the minimum levels of access necessary to complete its tasks. This means granting only the rights or permissions necessary to perform an assigned job function, and no more. This approach helps limit the potential damage that can result from errors, system faults, or unauthorized use of privileges, making it a fundamental strategy for maintaining system security.
- Legacy System A legacy system is an outdated computing system or application that is still in use despite being surpassed by newer technologies. These systems often lack support and modern security features, making them vulnerable to cyber threats. Security strategies for legacy systems may include isolated environments, stringent access controls, and regular risk assessments until they can be safely upgraded or replaced.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.