| DoS | Denial of Service. Interruptions to internet service caused by a DoS attack. | 
| DoS attack | An attack against a Web site, a network, a system, or other service provider intended to disrupt | 
| 
 | its ability to provide services to its users. Software that performs a DoS attack (DoS software ) | 
| 
 | overloads the service provider with requests for service until its capacity to respond to new service | 
| 
 | requests is exceeded. Legitimate requests for service cannot access to the service until the attack | 
| 
 | is stopped. See also Distributed DoS attack. | 
| DoS software | Denial of Service software used by attackers to control and initiate DoS attacks against other | 
| 
 | systems and networks, either within your administrative domain, outside it, or over the Internet. | 
| 
 | Also called Intrusion software. | 
| Egress filtering | Filtering software that prevents IP packets with randomly generated source addresses from exiting | 
| 
 | your system or network, when one of your systems has been compromised and when the system | 
| 
 | is being used to perpetrate an attack against other systems. See also Ingress filtering. | 
| File Transfer | See FTP. | 
| Protocol | 
 | 
| Firewall | Hardware and software that lies between two networks, such as an internal network and an | 
| 
 | Internet service provider. The firewall protects your network by blocking unwanted users from | 
| 
 | gaining access and by disallowing messages to specific recipients outside the network. | 
| FQDN | See fully qualified domain name. | 
| FTP | File Transfer Protocol. A client/server protocol that lets a user on one computer transfer files to | 
| 
 | and from another computer over a TCP/IP network. | 
| fully qualified | The full name of a system, consisting of its local host name and its domain name. A fully qualified | 
| domain name | domain name is usually precise enough to determine an Internet address for any host on the | 
| 
 | Internet. | 
| HTTP | Hyper Text Transfer Protocol. The protocol that is used between a Web browser and a server to | 
| 
 | request a document and transfer its contents. The specification is maintained and developed by | 
| 
 | the World Wide Web Consortium. See also HTTPS | 
| HTTPS | Ordinary http exchanged over a Secure Sockets Layer (SSL) encrypted session. See also SSL. | 
| IMAP | Internet Message Access Protocol. A method of accessing  | 
| 
 | on a (possibly shared) mail server. IMAP permits an  | 
| 
 | messages as if they were local. | 
| Ingress filtering | Filtering software that removes IP packets with untrusted source addresses before they have a | 
| 
 | chance to enter and affect your system or network. See also Egress filtering. | 
| Intrusion software | See DoS software. | 
| LDAP | Lightweight Directory Access Protocol. An Internet standard protocol that runs over TCP/IP and | 
| 
 | can be used to provide a standalone directory service or to provide lightweight access to the | 
| 
 | X.500 directory. | 
| LDAP entry | A collection of attribute and value pairs stored on an LDAP server that describe something of | 
| 
 | interest; for example, a person, a company, or a printer. LDAP entries can be organized as a | 
| 
 | hierarchical tree of objects. The full set of attributes for an entry in the tree is defined through | 
| 
 | |
| Lynx Web Browser | A World Wide Web browser developed at the University of Kansas and used on | 
| 
 | |
| Mail Exchange | See MX record. | 
| Record | 
 | 
| MIME | Multipurpose Internet Mail Extensions. A standard for multipart, multimedia  | 
| 
 | World Wide Web hypertext documents on the Internet. MIME provides the ability to transfer | 
| 
 | nontextual data such as graphics, audio, and FAX. | 
| Multipurpose | See MIME. | 
| Internet Mail | 
 | 
| Extensions | 
 | 
| MX record | Mail Exchange Record. A Domain Name System (DNS) resource record type, indicating which | 
| 
 | host can handle electronic mail for a particular domain. | 
