Miscreant/Related Articles

From Citizendium, the Citizens' Compendium
Jump to: navigation, search
This article is developing and not approved.
Main Article
Talk
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
A list of Citizendium articles, and planned articles, about Miscreant.
See also changes related to Miscreant, or pages that link to Miscreant or to this page or whose text contains "Miscreant".

Parent topics

Subtopics

Other related topics

Bot-suggested topics

Auto-populated based on Special:WhatLinksHere/Miscreant. Needs checking by a human.

  • Amplification attack [r]: A means of denying service from computers, networks, or both, not by the direct volume or resource consumption of the attack stimulus itself, but by the volume of responses that it generates [e]
  • Denial of service [r]: An attack on a computer or communications system that tries to prevent the system delivering its normal services to its users, [e]
  • Domain Name System security [r]: A set of extensions to the Domain Name System to protect it from security threats known at the time [e]
  • Domain Name System [r]: The Internet service which translates to and from IP addresses and domain names. [e]
  • Global Information Grid [r]: The overall computing and communications architecture and systems interconnecting the U.S. Department of Defense military and civilian organizations, other government agencies, and allied nations; information is at the strategic/theater and operational, not tactical levels [e]
  • Honeypot [r]: A hardened but isolated component of a network or computer, which is intended to be attractive to miscreants and invite attacks, with the goals of early warning and diverting the attack from critical resources [e]
  • Information security [r]: The set of policies and protective measures used to ensure appropriate confidentiality, integrity and availability to information; usually assumed to be information in a computer or telecommunications network but the principles extend to people and the physical world [e]
  • Malware [r]: A term created from the words "malicious" and "software", used to describe undesirable or harmful software and changes to a computer. [e]
  • Massachusetts Institute of Technology [r]: A private research university in Cambridge, Massachusetts with a strong emphasis on scientific and technological research. [e]
  • Resource attack [r]: Malware that overwhelms processing, memory, or network resources of a computer system by sending large numbers requests that appear legitimate, but at a high rate or in some manner crafted to make resources unavailable [e]
  • Sinkhole (Computer network) [r]: Techniques and equipment that divert hostile traffic, entering a computer network, to a place where they will not disturb production, and can be analyzed with appropriate forensics and diagnostics [e]
  • Sinkhole (computers) [r]: A network element, or set of network elements, to which suspect or confirmed attacking traffic is diverted, both for protecting the production network and for planning and executing a specific defense [e]
  • Transmission Control Protocol [r]: (TCP) A protocol that reliably delivers bytes across an internet. As long as the connection is up, bytes will be delivered without bit errors and in the order they were sent. It does not guarantee latency. [e]
  • Value of networks [r]: A variety of factors influence the value of communications networks, including the number of participants, the interconnections among the participants, and the reliability of both the physical network and the information it carries. [e]
  • Worm (computers) [r]: A form of malware that can spread, among networked computers, without human interaction. [e]