rfc_4949_internet_security_glossary_definitions_h

RFC 4949 Internet Security Glossary Definitions H

RFC 4949: #, A, B, C, D, E, F, G, H, I, J, K, L, M, N, O, P, Q, R, S, T, U, V, W, X, Y, Z (navbar_rfc4949)


([[Fair Use]] [[Source]]: [[RFC 4949])


(D) See: Deprecated Usage under “Handling Restrictions field”.

([[Fair Use]] [[Source]]: [[RFC 4949])


1a. (I) /verb/ To work on something, especially to program a computer. (See: hacker.)

1b. (I) /verb/ To do some kind of mischief, especially to play a prank on, or penetrate, a system. (See: hacker, cracker.)

2. (I) /noun/ An item of completed work, or a solution for a problem, that is non-generalizable, i.e., is very specific to the application area or problem being solved.

Tutorial: Often, the application area or problem involves computer programming or other use of a computer. Characterizing something as a hack can be a compliment, such as when the solution is minimal and elegant; or it can be derogatory, such as when the solution fixes the problem but leaves the system in an unmaintainable state.

See [Raym] for several other meanings of this term and also definitions of several derivative terms.

([[Fair Use]] [[Source]]: [[RFC 4949])


1. (I) Someone with a strong interest in computers, who enjoys learning about them, programming them, and experimenting and otherwise working with them. (See: hack. Compare: adversary, cracker, intruder.)

Usage: This first definition is the original meaning of the term (circa 1960); it then had a neutral or positive connotation of “someone who figures things out and makes something cool happen”.

Shirey Informational Page 138]

RFC 4949 Internet Security Glossary, Version 2 August 2007

2. (O) “An individual who spends an inordinate amount of time working on computer systems for other than professional purposes.” [NCSSG]

3. (D) Synonym for “cracker”.

Deprecated Usage: Today, the term is frequently (mis)used (especially by journalists) with definition 3.

([[Fair Use]] [[Source]]: [[RFC 4949])


1. (I) /verb/ Perform processing operations on data, such as receive and transmit, collect and disseminate, create and delete, store and retrieve, read and write, and compare. (See: access.)

2. (I) /noun/ An online pseudonym, particularly one used by a cracker; derived from citizens' band radio culture.

([[Fair Use]] [[Source]]: [[RFC 4949])


(I) A type of access control other than (a) the rule-based protections of mandatory access control and (b) the id[[entity-based protections of discretionary access control; usually involves administrative security.

([[Fair Use]] [[Source]]: [[RFC 4949])


(I) A 16-bit field that specifies a control and release marking in the security option (option type 130) of IP's datagram header format. The valid field values are alphanumeric digraphs assigned by the U.S. Government, as specified in RFC 791.

Deprecated Abbreviation: IDOCs SHOULD NOT use the abbreviation “H field” because it is potentially ambiguous. Instead, use “Handling Restrictions field”.

([[Fair Use]] [[Source]]: [[RFC 4949])


(I) Protocol dialogue between two systems for identifying and authenticating themselves to each other, or for synchronizing their operations with each other.

([[Fair Use]] [[Source]]: [[RFC 4949])


(I) /TLS/ The TLS Handshake Protocol consists of three parts (i.e., subprotocols) that enable peer entities to agree upon security parameters for the record layer, authenticate themselves to each other, instantiate negotiated security parameters, and report error conditions to each other. [R4346]

Shirey Informational Page 139]

RFC 4949 Internet Security Glossary, Version 2 August 2007

([[Fair Use]] [[Source]]: [[RFC 4949])


(I) To protect a system by configuring it to operate in a way that eliminates or mitigates known vulnerabilities. Example: [RSCG]. (See: default account.)

([[Fair Use]] [[Source]]: [[RFC 4949])


(I) The material physical components of an information system. (See: firmware, software.)

([[Fair Use]] [[Source]]: [[RFC 4949])


(I) /threat action/ See: secondary definitions under “corruption”, “exposure”, and “incapacitation”.

([[Fair Use]] [[Source]]: [[RFC 4949])


See: token.

([[Fair Use]] [[Source]]: [[RFC 4949])


(D) Synonym for “hash result” or “hash function”.

Deprecated Term: IDOCs SHOULD NOT use this term; it mixes concepts in a potentially misleading way. A hash result is not a “code”, and a hash function does not “encode” in any sense defined by this glossary. (See: hash value, message digest.)

([[Fair Use]] [[Source]]: [[RFC 4949])


1. (I) A function H that maps an arbitrary, variable-length bit string, s, into a fixed-length string, h = H(s) (called the “hash result”). For most computing applications, it is desirable that given a string s with H(s) = h, any change to s that creates a different string s' will result in an unpredictable hash result H(s') that is, with high probability, not equal to H(s).

2. (O) “A (mathematical) function which maps values from a large (possibly very large) domain into a smaller range. A 'good' hash function is such that the results of applying the function to a (large) set of values in the domain will be evenly distributed (and apparently at random) over the range.” [X509]

Tutorial: A hash function operates on variable-length input (e.g., a message or a file) and outputs a fixed-length output, which typically is much shorter than most input values. If the algorithm is “good” as described in the “O” definition, then the hash function may be a candidate for use in a security mechanism to detect accidental changes in data, but not necessarily for a mechanism to detect changes made by active wiretapping. (See: Tutorial under “checksum”.)

Shirey Informational Page 140]

RFC 4949 Internet Security Glossary, Version 2 August 2007

Security mechanisms require a “cryptographic hash function” (e.g., MD2, MD4, MD5, SHA-1, Snefru), i.e., a good hash function that also has the one-way property and one of the two collision-free properties: - “One-way property”: Given H and a hash result h = H(s), it is hard (i.e., computationally infeasible, “impossible”) to find s. (Of course, given H and an input s, it must be relatively easy to compute the hash result H(s).) - “Weakly collision-free property”: Given H and an input s, it is hard (i.e., computationally infeasible, “impossible”) to find a different input, s', such that H(s) = H(s'). - “Strongly collision-free property”: Given H, it is hard to find any pair of inputs s and s' such that H(s) = H(s').

If H produces a hash result N bits long, then to find an s' where H(s') = H(s) for a specific given s, the amount of computation required is O(2**n); i.e., it is necessary to try on the order of 2 to the power n values of s' before finding a collision. However, to simply find any pair of values s and s' that collide, the amount of computation required is only O(2**(n/2)); i.e., after computing H(s) for 2 to the power n/2 randomly chosen values of s, the probability is greater than 1/2 that two of those values have the same hash result. (See: birthday attack.)

([[Fair Use]] [[Source]]: [[RFC 4949])


1. (I) The output of a hash function. (See: hash code, hash value. Compare: hash value.)

2. (O) “The output produced by a hash function upon processing a message” (where “message” is broadly defined as “a digital representation of data”). [DSG]

Usage: IDOCs SHOULD avoid the unusual usage of “message” that is seen in the “O” definition.

([[Fair Use]] [[Source]]: [[RFC 4949])


(D) Synonym for “hash result”.

Deprecated Term: IDOCs SHOULD NOT use this term for the output of a hash function; the term could easily be confused with “hashed value”, which means the input to a hash function. (See: hash code, hash result, message digest.)

([[Fair Use]] [[Source]]: [[RFC 4949])


  • HDM

(O) See: Hierarchical Development Methodology.

Shirey Informational Page 141]

RFC 4949 Internet Security Glossary, Version 2 August 2007

([[Fair Use]] [[Source]]: [[RFC 4949])


(O) A methodology, language, and integrated set of software tools developed at SRI International for specifying, coding, and verifying software to produce correct and reliable programs. [Cheh]

([[Fair Use]] [[Source]]: [[RFC 4949])


(I) A PKI architecture based on a certification hierarchy. (Compare: mesh PKI, trust-file PKI.)

([[Fair Use]] [[Source]]: [[RFC 4949])


(I) The process of generating configuration data and issuing public-key certificates to build and operate a certification hierarchy. (See: certificate management.)

([[Fair Use]] [[Source]]: [[RFC 4949])


(D) Synonym for “certification hierarchy”.

Deprecated Term: IDOCs SHOULD NOT use this term; it mixes concepts in a potentially misleading way. (See: certification hierarchy, trust, web of trust.)

([[Fair Use]] [[Source]]: [[RFC 4949])


(O) “An oxymoron,” said Lt. Gen. William H. Campbell, former U.S. Army chief information officer, speaking at an Armed Forces Communications and Electronics Association conference.

Usage: IDOCs that use this term SHOULD state a definition for it because the term mixes concepts and could easily be misunderstood.

([[Fair Use]] [[Source]]: [[RFC 4949])


(I) A form of active wiretapping in which the attacker seizes control of a previously established communication association. (See: man-in-the-middle attack, pagejacking, piggyback attack.)

([[Fair Use]] [[Source]]: [[RFC 4949])


  • HIPAA

(N) Health Information Portability and Accountability Act of 1996, a U.S. law (Public Law 104-191) that is intended to protect the privacy of patients' medical records and other health information in all forms, and mandates security for that information, including for its electronic storage and transmission.

([[Fair Use]] [[Source]]: [[RFC 4949])


(I) A keyed hash [R2104] that can be based on any iterated cryptographic hash (e.g., MD5 or SHA-1), so that the cryptographic strength of HMAC depends on the properties of the selected cryptographic hash. (See: [R2202, R2403, R2404].)

Shirey Informational Page 142]

RFC 4949 Internet Security Glossary, Version 2 August 2007

Derivation: Hash-based MAC. (Compare: CMAC.)

Tutorial: Assume that H is a generic cryptographic hash in which a function is iterated on data blocks of length B bytes. L is the length of the of hash result of H. K is a secret key of length L ⇐ K ⇐ B. The values IPAD and OPAD are fixed strings used as inner and outer padding and defined as follows: IPAD = the byte 0x36 repeated B times, and OPAD = the byte 0x5C repeated B times. HMAC is computed by H(K XOR OPAD, H(K XOR IPAD, inputdata)).

HMAC has the following goals: - To use available cryptographic hash functions without modification, particularly functions that perform well in software and for which software is freely and widely available. - To preserve the original performance of the selected hash without significant degradation. - To use and handle keys in a simple way. - To have a well-understood cryptographic analysis of the strength of the mechanism based on reasonable assumptions about the underlying hash function. - To enable easy replacement of the hash function in case a faster or stronger hash is found or required.

([[Fair Use]] [[Source]]: [[RFC 4949])


  • honey pot

(N) A system (e.g., a web server) or system resource (e.g., a file on a server) that is designed to be attractive to potential crackers and intruders, like honey is attractive to bears. (See: entrapment.)

Usage: It is likely that other cultures use different metaphors for this concept. Therefore, to avoid international misunderstanding, an IDOC SHOULD NOT use this term without providing a definition for it. (See: Deprecated Usage under “Green Book”.)

([[Fair Use]] [[Source]]: [[RFC 4949])


1. (I) /general/ A computer that is attached to a communication subnetwork or internetwork and can use services provided by the network to exchange data with other attached systems. (See: end system. Compare: server.)

2. (I) /IPS/ A networked computer that does not forward IP packets that are not addressed to the computer itself. (Compare: router.)

Derivation: As viewed by its users, a host “entertains” them, providing Application-Layer services or access to other computers attached to the network. However, even though some traditional peripheral service devices, such as printers, can now be

Shirey Informational Page 143]

RFC 4949 Internet Security Glossary, Version 2 August 2007

independently connected to networks, they are not usually called hosts.

([[Fair Use]] [[Source]]: [[RFC 4949])


(I) See: Hypertext Markup Language.

([[Fair Use]] [[Source]]: [[RFC 4949])


(I) See: Hypertext Transfer Protocol.

([[Fair Use]] [[Source]]: [[RFC 4949])


(I) When used in the first part of a URL (the part that precedes the colon and specifies an access scheme or protocol), this term specifies the use of HTTP enhanced by a security mechanism, which is usually SSL. (Compare: S-HTTP.)

([[Fair Use]] [[Source]]: [[RFC 4949])


(I) /threat action/ See: secondary definitions under “corruption”, “exposure”, and “incapacitation”.

([[Fair Use]] [[Source]]: [[RFC 4949])


(I) An application of cryptography that combines two or more encryption algorithms, particularly a combination of symmetric and asymmetric encryption. Examples: digital envelope, MSP, PEM, PGP. (Compare: superencryption.)

Tutorial: Asymmetric algorithms require more computation than equivalently strong symmetric ones. Thus, asymmetric encryption is not normally used for data confidentiality except to distribute a symmetric key in a hybrid encryption scheme, where the symmetric key is usually very short (in terms of bits) compared to the data file it protects. (See: bulk key.)

([[Fair Use]] [[Source]]: [[RFC 4949])


(I) In hypertext or hypermedia, an information object (such as a word, a phrase, or an image, which usually is highlighted by color or underscoring) that points (i.e., indicates how to connect) to related information that is located elsewhere and can be retrieved by activating the link (e.g., by selecting the object with a mouse pointer and then clicking).

([[Fair Use]] [[Source]]: [[RFC 4949])


(I) A generalization of hypertext; any media that contain hyperlinks that point to material in the same or another data object.

Shirey Informational Page 144]

RFC 4949 Internet Security Glossary, Version 2 August 2007

([[Fair Use]] [[Source]]: [[RFC 4949])


(I) A computer document, or part of a document, that contains hyperlinks to other documents; i.e., text that contains active pointers to other text. Usually written in HTML and accessed using a web browser. (See: hypermedia.)

([[Fair Use]] [[Source]]: [[RFC 4949])


(I) A platform-independent system of syntax and semantic]s ([[RFC 1866) for adding characters to data files (particularly text files) to represent the data's structure and to point to related data, thus creating hypertext for use in the World Wide Web and other applications. (Compare: XML.)

([[Fair Use]] [[Source]]: [[RFC 4949])


(I) A TCP-based, Application-Layer, client-server, Internet protocol (RFC 2616) that is used to carry data requests and responses in the World Wide Web. (See: hypertext.)


Fair Use Sources

Cybersecurity: DevSecOps - Security Automation, Cloud Security - Cloud Native Security (AWS Security - Azure Security - GCP Security - IBM Cloud Security - Oracle Cloud Security, Container Security, Docker Security, Podman Security, Kubernetes Security, Google Anthos Security, Red Hat OpenShift Security); Identity and Access Management (IAM), OS Security, Java Security, Security, (Mobile Security: Android Security - Kotlin Security - Java Security, iOS Security - Swift Security; Windows Security - Windows Server Security, Linux Security (Ubuntu Security, Debian Security, RHEL Security, Fedora Security), UNIX Security (FreeBSD Security), IBM z Mainframe Security, Passwords, Linux Passwords, Windows Passwords), Passkeys, Hacking (Ethical Hacking, White Hat, Black Hat, Grey Hat), Pentesting (Red Team - Blue Team - Purple Team), Cybersecurity Certifications (CEH, GIAC, CISM, CompTIA Security Plus, CISSP), Mitre Framework, Common Vulnerabilities and Exposures (CVE), Cybersecurity Bibliography, Cybersecurity Courses, Firewalls, Cybersecurity CI/CD, Functional Programming and Cybersecurity, Cybersecurity and Concurrency, Cybersecurity and Data Science - Cybersecurity and Databases, Cybersecurity and Machine Learning, Cybersecurity Glossary (RFC 4949 Internet Security Glossary), Awesome Cybersecurity, Cybersecurity GitHub, Cybersecurity Topics (navbar_security - see also navbar_aws_security, navbar_azure_security, navbar_gcp_security, navbar_k8s_security, navbar_docker_security, navbar_podman_security, navbar_mainframe_security, navbar_ibm_cloud_security, navbar_oracle_cloud_security, navbar_database_security, navbar_windows_security, navbar_linux_security, navbar_macos_security, navbar_android_security, navbar_ios_security, navbar_os_security, navbar_firewalls, navbar_encryption, navbar_passwords, navbar_iam, navbar_pentesting, navbar_privacy)

Request for Comments (RFC): List of RFCs, GitHub RFCs, Awesome RFCs, (navbar_rfc)


© 1994 - 2024 Cloud Monk Losang Jinpa or Fair Use. Disclaimers

SYI LU SENG E MU CHYWE YE. NAN. WEI LA YE. WEI LA YE. SA WA HE.


rfc_4949_internet_security_glossary_definitions_h.txt · Last modified: 2024/04/28 03:51 (external edit)