A process for finding a remote terminal or secure SSL VPN (virtual private network). In a call back, the host system detaches the caller before dialing the sanctioned telephone number of the remote terminal in order to reestablish the connection.
A restrictive label which has been applied to data that is classified or unclassified to increase the protection of the data while further restricting data access.
Cavity Internet Security Threat
An overwriting internet security threat which overwrites either slack space in or behind the intended program file or sections of null data in the file. Thus, it can infect host files without increasing the length of the file or effecting the host's functionality.
Computer Emergency Response Team (network, Internet, security) The CERT was formed by ARPA in November 1988 in response to the needs exhibited during the Internet worm incident. The CERT charter is to work with the Internet community to facilitate its response to computer security events involving Internet hosts, to take proactive steps to raise the community's awareness of computer security issues, and to conduct research targeted at improving the security of existing systems. CERT products and services include 24-hour technical assistance for responding to computer security incidents, product vulnerability assistance, technical documents, and tutorials. In addition, the team maintains a number of mailing lists (including one for CERT Advisories), and provides an anonymous FTP server, at "cert.org", where security-related documents and tools are archived.