Glossary of Cyber Security Terms

Essential Vocabulary for Navigating the World of Cyber Security

L

L2F (Layer 2 Forwarding Protocol)

L2F, an internet protocol originally crafted by Cisco, employs tunneling of PPP (Point-to-Point Protocol) over IP to mimic a dial-up link across a network. Initiated by the dial-up server, this process remains unseen by the dial-up user.

L2TP (Layer 2 Tunneling Protocol)

L2TP is like an upgrade to the Point-to-Point Tunneling Protocol. Internet service providers use it to set up a virtual private network over the internet, offering another layer of privacy and security.

Lattice Techniques

These techniques utilize security designations to dictate access to information, creating a lattice of permissions and restrictions. They contribute to maintaining a secure and structured data access environment.

Least Privilege Principle

The Least Privilege Principle stands by the rule of minimizing permissions. It provides users or applications only the bare minimum permissions necessary to carry out their assigned roles, effectively reducing the risk of unauthorized access.

Legion

Legion is a software tool adept at detecting unprotected shares, an essential part of network security checks.

Lightweight Directory Access Protocol (LDAP)

LDAP is the all-seeing eye in the digital world. This software protocol allows anyone to locate individuals, organizations, and resources—like files and devices—in a network, be it the public internet or a corporate intranet.

Link State

In the realm of networking, the link state process involves routers maintaining information about all routers and router-to-router links within a geographical area. Using this information, they create a table of optimal routes.

List-Based Access Control

List-Based Access Control attaches a list of users and their corresponding privileges to each object, essentially creating an inventory of who can access what.

Load Balancing

Like a skilled juggler, load balancing enhances the distribution of workloads across multiple computing resources—including computers, computer clusters, network links, CPUs, or disk drives. It ensures an even spread of tasks for optimal system performance.

Loadable Kernel Modules (LKM)

LKM act like plugins for your system's kernel. They allow you to incorporate additional functionality directly into the kernel while the system is active, expanding the system's capabilities without requiring a reboot.

Log Clipping

Log clipping is akin to a criminal wiping their fingerprints. It involves the selective removal of log entries from a system log to conceal a security compromise.

Logic Bombs

Logic bombs are like digital time bombs. They're programs or segments of code that execute when a certain predefined event occurs—like a ticking time bomb that detonates at a specific date or under specific circumstances.

Logic Gate

A logic gate is the fundamental building block of a digital circuit. Typically, logic gates have two inputs and one output and operate in the binary language of 0s and 1s, the universal language of digital circuits.

Loopback Address

The loopback address (127.0.0.1) is a unique IP address that always points back to the local host. It's like your digital mirror, reflecting back onto your own system, and never gets transmitted onto a network.