Welcome to the ninth issue of ISO 17799 News, designed to keep you abreast of developments and news with respect to ISO17799 and information security.
The newsletter is absolutely free to our subscribers and provides guidance on various practical issues, plus commentary on recent Information Security incidents.
Included in this edition are the following topics:
ISO 17799 / BS7799 RELATED DEFINITIONS AND TERMS
In each newsletter we include a selection of definitions and terms to explain some of the jargon and language used by information security and IT professionals. In this issue, we have provided a selection of terms that all start with the letter ‘P’:
Individual who has risen above the tinkering Anorak level with aspirations to be a Hacker - but does not yet have the necessary skills to crack a major system. Can cause much damage by clumsy entry Hacking and blundering around the system corrupting files - albeit unintentionally. Proto-hackers may have marginally more technical skills than Anoraks but still display immaturity by leaving calling cards, messages, graphics, etc. As a result most of them are identified and caught before they graduate to being full Hackers
Term used to describe a virus which changes itself each time it replicates in an attempt to hide from Anti-virus software.
Checking the status of an input line, sensor, or memory location to see if a particular external event has been registered. Typically used on fax machines to retrieve information from a remote source - the user will dial from one fax machine to another, then press the polling button to get information from the remote fax machine.
Archiving a working model of obsolete computer technology so that a machine will be available to read old archive records which were created and stored using that machines' system. Reportedly, Apple Computers have pickled a shrink-wrapped Apple II machine so that it can read Apple II software (if necessary) in the future.
A set of formal rules describing how to transmit data, especially across a network. Low level protocols define the electrical and physical standards to be observed, bit- and byte-ordering and the transmission and error detection and correction of the bit stream. High level protocols deal with the data formatting, including the syntax of messages, the terminal to computer dialogue, character sets, sequencing of messages etc. Some examples of protocols are: TCP/IP, the protocol used on the internet to send and receive information (HTTP is a subset of TCP/IP).