Lattice techniques
Lattice techniques use security designations to determine access to information.
Layer 2 forwarding protocol l2f
Layer 2 forwarding protocol (l2f) is an internet protocol, originally developed by cisco corporation, that uses tunneling of ppp over ip to create a virtual extension of a dial-up link across a network, initiated by the dial-up server and transparent to the dial-up user.
Layer 2 tunneling protocol l2tp
An extension of the point-to-point tunneling protocol used by an internet service provider to enable the operation of a virtual private network over the internet.
Least privilege
Least privilege is the principle of allowing users or applications the least amount of permissions necessary to perform their intended function.
Legion
A legion is a software used to detect unprotected shares.
Lightweight directory access protocol ldap
Lightweight directory access protocol (ldap) is an open, vendor-neutral, industry standard application protocol used for accessing and maintaining distributed directory information services over an ip network.
Link state
Link-state routing protocols are one of the two main classes of routing protocols used in packet switching networks. The link-state protocol is performed by every switching node in the network. Every node creates a map of the connectivity to the network (in the form of a graph) displaying all the nodes that are connected to other nodes. Each node then calculates the next best logical path from it to every possible destination in the network. The collection of these best paths forms the node’s routing table.
List based access control
List based access control associates a list of users and their privileges with each object, such as a file directory or individual file. Each object has a security attribute that identifies its access control list. The list has an entry for each system user with access privileges. This list is implemented differently by each operating system.
Loadable kernel modules lkm
Loadable kernel modules (lkm) is an object file that contains code to extend the running kernel or the base kernel of an operating system. Lkms are usually used to add support for new hardware and/or file systems, and even for adding system calls.
Log clipping
Log clipping is the selective removal of log entries from a system log to hide a compromise.
Logic bombs
A logic bomb is a piece of code that is deliberately inserted into a system to trigger a malicious program. Viruses and worms often contain logic bombs that execute a certain payload at a pre-defined time or when some other condition is met. Some viruses attack their host systems on specific dates, such as friday the 13th or april fools’ day. Trojans that activate on certain dates are often called time bombs.
Logic gate
A logic gate is an elementary building block of a digital circuit. This device is used to implement a boolean function. It performs a logical operation on one or more logical inputs, and produces a single logical output.
Loopback address
A loopback address is a pseudo address that sends outgoing signals back to the same computer for testing. In a tcp/ip network, the loopback ip address is 127.0.0.1, and pinging this address always returns a reply unless the firewall prevents it.