Skip to Main Content
Apply
Quicklinks
Search
A-Z Index
BengalWeb
Campus Map
Directory
Email
Events
Library
Moodle
News
Give
Admissions
Students
Faculty & Staff
Parents
Alumni & Visitors
Academic Calendar
Academic Catalogs
Administration
Advising
Athletics
Campus Security
Career Center
Class Schedule
Colleges & Departments
Financial Aid
Health & Wellness
Housing
Human Resources
Jobs
Museum of Natural History
Parking
Registrar
Scholarships
Transcripts
Tuition
Majors
Cost
Visit
Parking
Map
Apply
Give
Search
Common Searches
BengalWeb
Bookstore
Academic Calendar
Directory
COVID-19
Jobs
Human Resources
Moodle
Calendar
Tuition
JavaScriptMessages
Security Site
Security At ISU
News
Rss Feeds
Security Home
SiteMap
About
Competencies & Certifications
Contact
Industry Advisory Board
Opportunities
Capacity Building
Student Opportunities
Projects & Accomplishments
Student Resources
Curriculum
Curricula
Course Modules
Module 1
Ethics 1
Problems 1
Resource 1
Studies 1
Support 1
Module 2
Data Security
Environment
Ethics 2
Physical
Security Training
Support 2
Module 3
Audit
Costs & Benefits
Ethics 3
Personnel
Physical
Planning
Policy
Recovery
Support 3
System
Threats
Module 4
Module 5
Module 6
Module 7
Module 8
Idaho State University Cybersecurity Curriculum
Resources & Activities
Scholarship
Benefits
Criteria
Application
FAQ
Process
Academics
Philosophy
Professionalism
Academic Program
Admission to COB
COB Graduation Requirements
Course Descriptions
Graduate
INFO Major
IRI/SFS Program of Study
Supporting Courses
Critical Infrastructure Security
ESET 0281
ESET 0282
ESET 0283
ESET 0284
ESET 0285
ESET 0286
Smart Grid
ESET 0253
ESET 0254
ESET 0255
ESET 0256A
ESET 0257
ESET 0258
ESET 0259
Lower Division
ACCT 2201
2201 Syllabus
ACCT 2202
2202 Syllabus
ACCT 3323
ACCT 3324
Lower Division CS
CS 1187
CS 2275
CS 2282
INFO 1100
INFO 1101
INFO 1110
INFO 1120
INFO 1181/CS 1181
INFO 1182/CS 1182
INFO 2285
MGT 2261
Upper Division
Upper Division CS
CS 3385
CS 4487
EE 4427/4427L
INFO 3301
INFO 3307
INFO 3310
INFO 3380
INFO 3393
INFO 4407
INFO 4411
INFO 4412
4012 Competencies
INFO 4012 Mapping
Syllabus 4412
INFO 4413
4013 Mapping
Syllabus 4413
INFO 4414
4014 Mapping
Syllabus 4414
INFO 4415
4015 Competencies
4015 Mapping
INFO 4416
4416 Competencies
4016 Mapping
INFO 4417
INFO 4419
INFO 4420
INFO 4422
INFO 4424
INFO 4430
INFO 4432
INFO 4482
INFO 4485
INFO 4486
INFO 4487
INFO 4488
INFO 4491
INFO 4492
INFO 4493
INFO 4499
Law and Ethics
Graduate
INFO 5312
INFO 5313
INFO 5314
INFO 5511
INFO 5512/6612
CNSS 4012 Mapping
Competencies
INFO 6612
Syllabus 5512
INFO 5513
CNSS 4013 Mapping
Competencies
INFO 6613
Syllabus 5513
INFO 5514
CNSS 4014 Mapping
Competencies
INFO 6614
Syllabus 5514
INFO 5515
CNSS 4015 Mapping
Competencies
INFO 5516
CNSS 4016 Mapping
Competencies
INFO 5517
INFO 5519
INFO 5520
INFO 5522
INFO 5524
INFO 5526
INFO 5530
INFO 5531
INFO 5532
INFO 5540
INFO 5582
INFO 5584
INFO 5586
INFO 5587
INFO 6610
INFO 6620
INFO 6630
INFO 6640
INFO 6650
INFO 6660
INFO 6670
INFO 6699
MBA 6624
MBA 6625
MBA 6639
Reference page for CNSS
Cybersecurity Outreach
Government
Industry Professionals
Law Enforcement
Older Americans
Parents and Educators
Small Business
Students
Women's Outreach
Young Professionals
Ethics
ACM Ethics
IAP Behavior
IEEE Ethics
ISACA Ethics
ISSA Ethics
ISTE Ethics
"Non-IA" Courses
Courses w/ Projects
Schou Vita
Faculty
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
L
L2TP
Label
Labeled Security Protection
Labeling
Lace Card
Lamer
LAN
LAN (Local Area Network)
LAN Manager
LAND attack
Land Mobile Service
Land Mobile Station
Land Station
Landscape Mode
Language
Language Lawyer
Language Processor
Languages Of Choice
LANMAN
Laptop Computer
Larval Stage
Lase
Laser
Laser Chicken
Laser Intelligence
Lasherism
LASINT
Last-In, First-Out
LATA
Latent fingerprint
Lattice
Lattice Model
Laundromat
Law Enforcement Interfaces
Laws, Regulations, And Other Public Policies
Layer 2 Tunneling Protocol (L2TP)
LDB
LEAD
Leaf Site
Leak
Leaky Heap
Leapfrog Attack
Learning aids
Leased-Line Networks
Least Privilege
Leech
Legacy security technology
Legal
Legal And Liability Issues
Legalese
Legitimate User
LER
LERP
Lessons Learned
Let The Smoke Out
Letterbomb
Level
Level I/II/III
Level Of Trust
Lexer
Lexiphage
Liberty Alliance
Life
Life Cycle
Life Cycle Security
Life Cycle System Security Planning
Life Is Hard
Life-Cycle
Life-Cycle Security
LIFO
Light Pipe
Lightweight
Like Kicking Dead Whales Down The Beach
Like Nailing Jelly To A Tree
Likelihood of a threat
LIMDIS
LIMFACS
Limited Access
Limited Access Area
Limited Access Security Mode
Limited ADP Access Security Mode
Limited Area
Limited Exclusion Area
Limited Maintenance
Limited Protection
Line
Line Authentication
Line Conduction
Line Conductors
Line Eater, The
Line Load Control
Line Noise
Line Of Sight
Line Starve
Linear Analog Synchronization
Linear Predictive Coding
Linear Programming
Linearithmic
Link
Link Control Protocol
Link Encryption
Link Farm
Link Layer
Link Level
Link Protocol
Linkage
Link-By-Link Encipherment
Link-By-Link Encryption
Link-Dead
Lint
Linux
LINUX distribution
Lion Food
Lions Book
LISP
List Oriented
List-Based Access Controls
List-Oriented
Literature Intelligence
Literature, The
Lithium Lick
LITINT
Little-Endian
Live
Live Data
Live Free Or Die!
Live testing
Livelock
Liveware
LKG
LLC
LLNL
LMD
LME
LMI
Lobotomy
Local Area Network
Local Area Network (LAN)
Local Area Network Security
Local Exchange Loop
Local Nationals
Local Users and Groups
Locals, The
LOCK
Lock down
Lock-And-Key Protection System
Locked And Loaded
Locked Up
Lockout
Log
Log entry
Logging
Logic bomb
Logical
Logical Access Control
Logical Circuit
Logical Completeness
Logical Completeness Measure
Logical Link Control Sublayer
Logical Signaling Channel
Logical Topology
Login
Login History
Login password
Login/log In
Log-Off
Logoff/log Off
Logon
Log-On
Logon/log On
Logs And Journals
Long Title
Long-Haul Communication
Long-Range Plan
Loop
Loop Through
Loop-Back
Loophole
Loose Bytes
Lord High Fixer
LOS
Lose
Lose Lose
Loser
Losing
Loss
Lossage
Lost Call
Lost In The Noise
Lost In The Underflow
Lots Of MIPS But No I/O
Low Power
Low Probability Of
Low Probability Of Detection
Low Probability Of Intercept
Low Water Mark
Low-Bandwidth
LP
LPC
LPD
LPI
LPT
LRIP
Ls
LSI
LTHE
Lubarsky's Law Of Cybernetic Entomology
Lunatic Fringe
Lurker
Luser
Luser
n. /loo'zr/ A user; esp. one who is also a loser. (luser and loser are pronounced identically. ) This word was coined around 1975 at MIT. Under ITS, when you first walked up to a terminal at MIT and typed Control-Z to get the computer's attention, it printed out some status information, including how many people were already using the computer; it might print "14 users", for example. Someone thought it would be a great joke to patch the system to print "14 losers" instead. There ensued a great controversy, as some of the users didn't particularly want to be called losers to their faces every time they used the computer. For a while several hackers struggled covertly, each changing the message behind the back of the others; any time you logged into the computer it was even money whether it would say "users" or "losers". Finally, someone tried the compromise "lusers", and it stuck. Later one of the ITS machines supported `luser' as a request-for-help command. ITS died the death in mid-1990, except as a museum piece; the usage lives on, however, and the term `luser' is often seen in program comments.