Cybersecurity Definitions U 0 0

Posted ByVoror

Udp scan

A udp scan performs scans to determine which udp ports are open or vulnerable. Udp is a connectionless protocol so there is no equivalent to a tcp syn packet. However, if a udp packet is sent to a port that is not open, the system will respond with an icmp port unreachable message.

Unicast

Unicast is defined as any communication between a single sender and a single receiver over a network. The term exists in contradiction to multicast, communication between a single sender and multiple receivers, and any cast, communication between any sender and the nearest of a group of receivers in a network.

Uniform resource identifier uri

A uniform resource identifier (uri) is a string of characters that are used to identify the name of a resource. Such identification enables interaction with representations of the resource over a network (such as the world wide web) using specific protocols. In other words, uri is the generic term for all types of names and addresses that refer to objects on the world wide web.

Uniform resource locator url

A uniform resource locator (url) is the global address of documents and other resources on the world wide web. The first part of the address indicates what protocol to use, and the second part specifies the ip address or the domain name where the resource is located. A url is a specific type of uniform resource identifier (uri), although many people use the two terms interchangeably. A url implies the means to access an indicated resource, which is not true of every uri. Urls occur most commonly to reference web pages (http), but are also used for file transfer (ftp), email (mailto), database access (jdbc), and many other applications.

Unix

Unix is a popular multi-user, multi-tasking operating system developed at Bell labs in the early 1970s by ken thompson, dennis ritchie, and others. Unix was designed to be a small, flexible system used exclusively by programmers.

Unprotected share

An unprotected share is a mechanism that allows a user to connect to file systems and printers on other systems. An unprotected share is one that allows anyone to connect to it.

User contingency plan

A user contingency plan is the alternative method of continuing business operations if its systems are unavailable.

User datagram protocol udp

The user datagram protocol (udp) is a communication protocol that, like tcp, runs on top of ip networks. The protocol was designed by david p. Reed in 1980 and formally defined in rfc 768. Udp uses a simple connectionless transmission model with a minimum protocol mechanism. It is used primarily for broadcasting messages over a network. Udp uses the internet protocol to get a datagram from one computer to another but does not divide a message into packets (datagrams) and reassemble it at the other end. Udp doesn’t provide sequencing of the packets that the data arrives in.

User

A user is any person, organization entity, or automated process that accesses a system, whether authorized to do so or not. Users generally use a system or a software product without the technical expertise required to fully understand it.

** The time is base on America/Chicago timezone