Cybersecurity Definitions G 0 0

gateway

Gateways are network points that act as an entrance to another network. A node or stopping point can be either a gateway node or a host (end-point) node. Get nearest server Get nearest server is a request packet sent by a client on an ipx network to locate the nearest active server of a particular type. An ipx network client issues a gns request to solicit either a direct response from a connected server or a response from a router that tells it where on the inter-network the service can be located. Gns is part of the ipx sap.

Gethostbyaddr

The gethostbyaddr is a dns (domain name system) query that returns the internet host name corresponding to an ip address.

Global information grid gig

The global information grid is the globally interconnected, end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel. The gig includes owned and leased communications and computing systems and services, software (including applications), data, security services, other associated services, and national security systems. Non-gig includes stand-alone, self-contained, or embedded it that is not, and will not be, connected to the enterprise network.

Global information infrastructure gii

The global information infrastructure is the worldwide interconnections of the information systems of all countries, international and multinational organizations, and international commercial communications.

Gnu

The name gnu stands for “gnu’s not unix” (gnu is pronounced as g’noo). The development of gnu started in january 1984 and is known as the gnu project. Gnu is a unix-like operating system (os), that comprises many programs such as applications, libraries, developer tools, games. The gnu is available with source code that allows a user to run, copy, modify, distribute, study, change, and improve the software.

Gnutella

Gnutella is an open file sharing or peer-to-peer (p2p) network that was originally developed by Justin Frankel and Tom Pepper of Nullsoft in the early 2000. It was the first decentralized file sharing network that acts as a server for sharing files while simultaneously acting as a client that searches for and downloads files from other users.

Governance risk management and compliance

Governance, risk management and compliance is a comprehensive and integrated organization wide system for achieving the goals set in each area namely governance, risk management, and compliance, and meet the regulatory standards and requirements.

Governance

Governance is a system for directing and controlling an organization. It includes a set of rules, processes, practices established to evaluate the options, needs, conditions of the stakeholders such as management, suppliers, financiers, customers, etc. It also includes a framework for attaining the established goals of an organization, alongside achieving a balance between the goals of organization and interests of the stakeholders. It aims to protect the interests of the organization by protecting assets of the organization, and the interests of the creditors, customers.

Graduated security

Graduated security is a security system that provides several levels (e.g., low, moderate, high) of protection based on threats, risks, available technology, support services, time, human concerns, and economics.

Group authenticator

A group authenticator is used sometimes in addition to a sign-on authenticator, to allow access to specific data or functions that may be shared by all members of a particular group.

Guard system

A guard system is a mechanism limiting the exchange of information between information systems or subsystems.

Guessing entropy

A guessing entropy is a measure of the difficulty that an attacker has to guess the average password used in a system. In this document, entropy is stated in bits. When a password has n-bits of guessing entropy then an attacker has as much difficulty guessing the average password as in guessing an n-bit random quantity. The attacker is assumed to know the actual password frequency distribution.

Guideline

A guideline is a general rule or a piece of advice required to follow in order to accomplish the set goals of an organization.

** The time is base on America/Chicago timezone