Term
10-Mbps Ethernet (Twisted Pair Ethernet) |
|
Definition
Ethernet standard operating at a speed of 10 megabits per second (Mbps) of data. |
|
|
Term
100-Mbps Ethernet (Fast Ethernet) |
|
Definition
Ethernet standard operating at a speed of 100 Mbps. |
|
|
Term
1000-Mbps Ethernet (Gigabit Ethernet) |
|
Definition
Used for large, high-speed LANs and heavy-traffic server connections; it operates at a speed of 1000 Mbps (1 gigabit per second). |
|
|
Term
10GbE (10 Gigabit Ethernet) |
|
Definition
The fastest of the Ethernet standards, with a data rate of 10 gigabits per second. |
|
|
Term
|
Definition
A port-based, authentication framework for wired and wireless access to Ethernet networks. |
|
|
Term
|
Definition
An improved version of the original Wi-Fi technology and is also based on the same IEEE 802 standard. |
|
|
Term
ACL (access control list) |
|
Definition
Controls the permissions to allow or deny user access to a folder or printer. |
|
|
Term
|
Definition
A repeater that simply amplifies all incoming signals and passes them on. |
|
|
Term
|
Definition
An IPv6 address that identifies a group of interfaces, typically on separate nodes, and then delivers anycast packets to the nearest interface as identified by the routing protocol distance measurement. |
|
|
Term
APIPA (Automatic Private IP Addressing) |
|
Definition
The non-routable network 169.254.0.0 used by Windows clients to automatically generate an address in this range if they are configured to obtain an IPv4 address from a DHCP server and are unable to contact one. |
|
|
Term
|
Definition
A routable network protocol supported by Apple Macintosh computers. |
|
|
Term
ARP (Address Resolution Protocol) |
|
Definition
Converts logical IP addresses to physical MAC addresses as part of the packet delivery process. |
|
|
Term
ATM (Asynchronous Transfer Mode) |
|
Definition
A very fast network technology that can be used with LANs as well as WANs; it uses fixed-length packets, called cells, to transmit data, voice, video, and frame relay traffic across virtual circuits. |
|
|
Term
|
Definition
Positive identification of the entity, either a person or a system, that wants to access information or services that have been secured. |
|
|
Term
|
Definition
A set level of access granted to an entity so that it can access the resource. |
|
|
Term
|
Definition
The DMZ network is located between two firewalls, the two firewalls between the Internet and the DMZ, and the DMZ and the intranet each have two network cards, as does the server within the DMZ. |
|
|
Term
|
Definition
A high-speed network link connecting network segments. |
|
|
Term
|
Definition
Ethernet standards run over shielded copper twisted-pair cable. |
|
|
Term
|
Definition
Ethernet standards run over fiber optic cable. |
|
|
Term
|
Definition
Ethernet standards run over shielded or unshielded twisted-pair cable. |
|
|
Term
|
Definition
Ethernet standards run over fiber optic cables; uses the same types of fiber and support the same distances as 10GBASE-R standards; however, Ethernet frames are encapsulated in SONET frames. Referred to as Wide Area Network Physical Layer (WAN PHY). |
|
|
Term
|
Definition
Ethernet standards run over fiber optic cable. |
|
|
Term
|
Definition
Computers that stand outside the protected network and are exposed to an attack by using two network cards, one for the DMZ and one for the intranet. Network communication isn't allowed between the two network cards in the bastion host server. |
|
|
Term
|
Definition
Uses something about a user, such as a fingerprint, retinal scan, or voice print, to secure an account or resource. |
|
|
Term
|
Definition
A short-range wireless technology limited to transmission distances of about 100 meters or less. |
|
|
Term
|
Definition
An internetworking device that connects two different LANs and makes them appear to be one; or segments a larger LAN into two smaller pieces. |
|
|
Term
|
Definition
An attack which manipulates the maximum field input size variable and then enters data much larger than the database is prepared to accept causing memory reserved for other data to be overwritten. |
|
|
Term
|
Definition
Each node is connected to the next by a direct line so that a continuous line is formed. |
|
|
Term
CA (certificate authority) |
|
Definition
The person or entity responsible for issuing certificates. |
|
|
Term
|
Definition
WAN connection technology that connects over the same lines that carry cable television signals. |
|
|
Term
|
Definition
A device used to find cable faults. Comes in analog and digital versions. |
|
|
Term
|
Definition
A device used to detect cables hidden behind walls or underground. |
|
|
Term
|
Definition
A device used to verify that each TP wire is connected to the correct pin. |
|
|
Term
|
Definition
WAN connection technology that connects through a cell phone or laptop's cellular network PC card on a cellular phone network. |
|
|
Term
|
Definition
Determines the physical methodology by which data is sent across the transmitting media. |
|
|
Term
CHAP (Challenge Handshake Authentication Protocol) |
|
Definition
An authentication method used by Point-to-Point Protocol (PPP) servers. CHAP validates the remote client's identity at the communication session start or at any time during the session. |
|
|
Term
CIDR (Classless Inter-Domain Routing) |
|
Definition
Allows you to use variable-length subnet masking (VLSM) to create additional addresses beyond those allowed by the IPv4 classes. |
|
|
Term
|
Definition
A dedicated line is allocated for the transmission of data between two network nodes. |
|
|
Term
|
Definition
A network with computers called servers, which hold data and provide a wealth of services that users can share. |
|
|
Term
|
Definition
Contains a layer of braided wire or foil between the core and the outside insulating layer. |
|
|
Term
|
Definition
Combines Cat5 or Cat6 and other transmission cables within a single PVC jacket. |
|
|
Term
|
Definition
The point in a horizontal run where two cables are interconnected using a reusable connector such as a punch-down block. |
|
|
Term
|
Definition
A device used to verify an electrical connection between two points. |
|
|
Term
CRL (certificate revocation list) |
|
Definition
A data structure containing revoked certificates. |
|
|
Term
|
Definition
A location where signals are distributed to various destinations. |
|
|
Term
|
Definition
A TP cable where one end is wired using 568A and the other using 568B, allowing you to directly connect two computers. |
|
|
Term
|
Definition
Alternating electrical current flowing through a wire creates an electromagnetic field around the wire which affects the current flow in any adjacent cables. |
|
|
Term
|
Definition
Maintains a database, or repository, of certificates. |
|
|
Term
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) |
|
Definition
Channel access method which doesn't detect collisions as much as it attempts to avoid collisions. |
|
|
Term
CSMA/CD (Carrier Sense Multiple Access with Collision Detection) |
|
Definition
The most common implementation of channel access; includes carrier sensing, multiple access, and collision detection. Examples include: Ethernet and 802.3. |
|
|
Term
CSU/DSU (Channel Service Unit/Digital Service Unit) |
|
Definition
A two-in-one device that cleans and formats data before sending it on a T1 line. The Channel Service Unit (CSU) acts as a safe electrical buffer between the LAN and a public network accessed by the T1 line. The Digital Service Unit or Data Service Unit (DSU) ensures that the data is formatted correctly before it's allowed on the T1 line. |
|
|
Term
|
Definition
Creating several smaller networks from a large network by taking bits from the host ID and adding them to the network ID. |
|
|
Term
|
Definition
A Performance Monitor feature that gathers information for a period you specify so that you can review a computer's performance over time. |
|
|
Term
DDoS (Distributed Denial of Service) |
|
Definition
A network attack in which the attacker manipulates several hosts to perform a DoS attack. |
|
|
Term
|
Definition
A network between two routers that uses another network protocol other than TCP/IP. |
|
|
Term
|
Definition
The point at which the communications network owned by one company connects to the communications network owned by another company. Also called demarcation point. |
|
|
Term
demarc terminating device |
|
Definition
Device responsible for the code and protocol conversions, as well as the buffering required for communications to and from an ISP and your internal network. Also referred to as the network terminating interface (NTI), network terminating unit (NTU), network terminating device (NTD), smart jack, or an MPOE (minimum point of entry). |
|
|
Term
|
Definition
The process a modem uses to convert analog data received from a phone line to digital. |
|
|
Term
DHCP (Dynamic Host Configuration Protocol) |
|
Definition
An automated mechanism to assign IP addresses to clients. There are two version—the original DHCP, which is used for IPv4 addressing, and Dynamic Host Configuration Protocol for IPv6 (DHCPv6), which is used for IPv6 addressing. |
|
|
Term
|
Definition
A successor to RADIUS; a new protocol which defines a minimum set of AAA services and functionality. |
|
|
Term
|
Definition
An area between the private network (intranet) and a public network (extranet) such as the Internet. |
|
|
Term
|
Definition
Used to resolve host names to IP addresses, find domain controllers, as well as resources on the Internet such as Web servers and e-mail servers. |
|
|
Term
|
Definition
An attack which consumes or disables resources so that services to users are interrupted. |
|
|
Term
DSL (Digital Subscriber Line) |
|
Definition
WAN connection technology that uses high-speed connections made over regular analog phone lines. |
|
|
Term
|
Definition
Digging useful information out of an organization's trash bin. |
|
|
Term
|
Definition
WAN connection technology that uses a modem to connect through regular, analog phone lines. |
|
|
Term
|
Definition
The European equivalent of the American T-lines. |
|
|
Term
EAP (Extensible Authentication Protocol) |
|
Definition
Includes multiple authentication methods, such as token cards, one-time passwords, certificates, and biometrics, and runs over the data link layers without requiring use of IP. |
|
|
Term
|
Definition
A technique through which source information is converted into a form that cannot be read by anyone other than the intended recipient. |
|
|
Term
|
Definition
Combines the bandwidth of two network interface cards as a cost-effective way to increase bandwidth available for data transfers for critical servers, such as firewalls and production servers. |
|
|
Term
|
Definition
An internetworking device that takes the signal transmitted from one computer and propagates it to all the other computers on the network configured as an Ethernet star. |
|
|
Term
|
Definition
The Windows logging utility. |
|
|
Term
|
Definition
A biometric hardware security device that scans the surface of a user's retina to obtain the blood vessel patterns found there, then compares it to a database of user names and passwords. |
|
|
Term
|
Definition
Carries light-based data through strands of glass or plastic. |
|
|
Term
|
Definition
A biometric hardware security device that scans a user's finger and compares the print to a database of user names and passwords. |
|
|
Term
|
Definition
Software or hardware used to control information that's sent and received from outside the network. |
|
|
Term
|
Definition
Packet-switching communication protocol designed for long-distance digital data transmission rather than the circuit-switching technology used by the telephone system. |
|
|
Term
FTP (File Transfer Protocol) |
|
Definition
An OSI Application layer protocol used to upload and download files, as well as request directory listings from remote servers. |
|
|
Term
|
Definition
Data can be transmitted across the medium in both directions at the same time. |
|
|
Term
|
Definition
A routable and reachable address on the IPv6 Internet; beginning with the binary values 001 (2000::/3) through 111 (E000::/3). (The IPv6 version of an IPv4 public address.) |
|
|
Term
|
Definition
Data is transmitted across the medium in both directions, but only in one direction at a time. |
|
|
Term
|
Definition
The process of modifying an operating system's default configuration to make it more secure from outside threats. |
|
|
Term
|
Definition
A unique fixed-length mathematical derivation of a plaintext message. |
|
|
Term
HIDS (host intrusion detection systems) |
|
Definition
Typically software based systems for monitoring the health and security of a particular host. HIDS monitor operating system files for unauthorized changes, watch for unusual usage patterns, or failed logon requests. |
|
|
Term
|
Definition
The junction point for the workstation cables. |
|
|
Term
|
Definition
|
|
Term
|
Definition
The portion of an IP address which represents a unique host on a network. |
|
|
Term
|
Definition
Fixes errors in the operating system code. |
|
|
Term
HTTP (Hypertext Transfer Protocol) |
|
Definition
An OSI Application layer protocol which defines the commands that Web browsers can send and how Web servers are capable of responding. |
|
|
Term
|
Definition
Two or more different types of network topologies are combined together into one network. |
|
|
Term
ICMP/ICMP6 (Internet Control Messaging Protocol) |
|
Definition
An OSI Network layer protocol used to send IP error and control messages between routers and hosts. |
|
|
Term
IDF (intermediate distribution frame) |
|
Definition
A network rack containing the devices connecting a floor's internal wiring to the MDF. |
|
|
Term
IDS (intrusion detection system) |
|
Definition
Installed inside your network to monitor both internal traffic and traffic that has passed through your firewall; it uses a monitoring port to look at data packets sent on the network. |
|
|
Term
|
Definition
A UNIX-based version of IPCONFIG—a command-line utility used to display and modify the current TCP/IP stack. |
|
|
Term
IGMP (Internet Group Management Protocol) |
|
Definition
An OSI Network layer protocol used for the management of multicast groups. |
|
|
Term
IMAP4 (Internet Message Access Protocol version 4) |
|
Definition
An OSI Application layer e-mail protocol used to retrieve e-mail messages; provides more features than POP3. |
|
|
Term
|
Definition
A wireless technology that uses pulses of invisible infrared light to transmit signals between devices, offering relatively low-speed, line-of-sight connections between devices. |
|
|
Term
|
Definition
The process of calculating and recording checksums to protect against viruses and worms. |
|
|
Term
|
Definition
An unreliable connectionless protocol, functioning at the Network layer of the OSI model. |
|
|
Term
|
Definition
A command-line utility used to display and modify the current TCP/IP stack. |
|
|
Term
IPS (intrusion prevention system) |
|
Definition
Installed on the perimeter of your network to monitor for and stop threats before they are passed on your network; shuts down suspicious traffic on the wire. |
|
|
Term
|
Definition
A 32-bit address consisting of a series of four 8-bit numbers separated by periods, which identifies a computer, printer, or other device on a TCP/IP network, such as the Internet or an intranet. |
|
|
Term
|
Definition
A 128-bit address, written in the hexadecimal equivalent values for each of its 16 bytes, which identifies a computer, printer, or other device on a TCP/IP network, such as the Internet or an intranet. |
|
|
Term
IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange) |
|
Definition
A routable, proprietary protocol that was the native protocol in early versions of Novell NetWare. |
|
|
Term
ISDN (Integrated Services Digital Network) |
|
Definition
Uses a telephone line to transmit data, but unlike POTS, the data isn't converted to analog form. An ISDN line is digital and consists of two phone circuits, both carried on one pair of wires along with a slower, third circuit used for control signals. |
|
|
Term
ISP (Internet Service Provider) |
|
Definition
A business that provides connectivity to the Internet. |
|
|
Term
|
Definition
The primary authentication protocol used in Active Directory Domain Services environments. |
|
|
Term
|
Definition
A piece of information that determines the result of an encryption algorithm. |
|
|
Term
|
Definition
The stages a key goes through during its life: generation, distribution, storage, backup, and destruction. |
|
|
Term
|
Definition
A specifically designed configuration of computers and other devices located within a confined area, such as a home or office building, and connected by wires or radio waves that permit the devices to communicate with one another to share data and services. |
|
|
Term
LDAP (Lightweight Directory Access Protocol) |
|
Definition
The industry-standard protocol for network directory services. |
|
|
Term
|
Definition
An IPv6 self-assigned address using the Neighbor Discovery process. (The IPv6 version of IPv4's APIPA.) |
|
|
Term
|
Definition
A device used to check cables for broken or shorted wires, and wall jack to network switch connections. |
|
|
Term
MAC (Media Access Control) address |
|
Definition
A unique address permanently embedded in a NIC by the manufacturer, used to identify the device on the LAN. |
|
|
Term
|
Definition
An attack that tricks e-mail servers into sending data through a third node. |
|
|
Term
|
Definition
A set of doors that are interlocked—when one door is opened, the other door can't be opened. |
|
|
Term
MDF (main distribution frame) |
|
Definition
A network rack that contains the devices used to manage the connections between external communication cables and the cables of your internal network. |
|
|
Term
|
Definition
An internetworking device that provides a connection between one network media type and another without changing the channel access method. |
|
|
Term
|
Definition
All nodes in the mesh have independent connections to all other nodes in the mesh. |
|
|
Term
|
Definition
An internetworking device that combines Layer 2 data switching with Layer 3 routing using an application-specific integrated circuit (ASIC). |
|
|
Term
|
Definition
A device that enables you to connect your computer to another computer through a phone line. |
|
|
Term
|
Definition
Combining multiple dial-up links over POTS for redundancy or increased throughput. |
|
|
Term
|
Definition
The process a modem uses to convert data into an analog signal to be sent over a phone line. |
|
|
Term
|
Definition
The ongoing process of gathering information. |
|
|
Term
|
Definition
An IPv4 or IPv6 address that sends information or services to all interfaces that are defined as members of the multicast group. |
|
|
Term
|
Definition
Optic fibers which support many transmission (propagation) paths. |
|
|
Term
MUTOA (Multiuser telecommunications outlet assembly) |
|
Definition
Centrally mounted workstation outlets (in a wall, not the ceiling). |
|
|
Term
|
Definition
Requires both the client and the server to authenticate to each other instead of just the client authenticating to the server like in other authentication systems. |
|
|
Term
NAC (Network Access Control) |
|
Definition
A process or architecture through which computers are verified to be in compliance, and brought into compliance if they fall short, before they are permitted access to the network. |
|
|
Term
NAP (Network Access Point) |
|
Definition
A major Internet connection point that's used to connect and route traffic between smaller commercial backbones. |
|
|
Term
NAT (network address translation) |
|
Definition
Modifies network address information in the packets it transmits from an internal network onto the Internet, allowing a single address from a router to rewrite originating IP addresses from the internal network so that they all appear to come from the router's IP address. |
|
|
Term
|
Definition
A non-routable, proprietary Microsoft protocol that's supported in Windows 9x/Me, Windows NT, and Windows 2000. |
|
|
Term
|
Definition
The portion of an IP address which represents the network on which a device resides. |
|
|
Term
|
Definition
A simple protocol analyzer for Microsoft Windows operating systems. |
|
|
Term
NEXT (near end crosstalk) |
|
Definition
Occurs when the signal from one pair of wires interferes with the signal on another pair of wires. |
|
|
Term
NIC (network interface card) |
|
Definition
Provides the communication channel between your computer's motherboard and the network. |
|
|
Term
|
Definition
A device on a network with an address that can be accessed to send or receive information. |
|
|
Term
|
Definition
A challenge-response protocol that's used with operating systems running Windows NT 4.0 or earlier. |
|
|
Term
NTP (Network Time Protocol) |
|
Definition
An OSI Application layer protocol that provides the mechanisms to synchronize time and coordinate time distribution in a large, diverse internet operating at rates from mundane to light wave. |
|
|
Term
one-factor authentication |
|
Definition
Use of a single type of authentication; typically something you know. |
|
|
Term
OSI (Open Systems Interconnection) model |
|
Definition
A standard means of describing a network operating system by defining it as a series of layers, each with specific input and output. |
|
|
Term
OTDR (optical time-domain reflectometer) |
|
Definition
Version of TDR for optical cable. |
|
|
Term
|
Definition
Data is broken up into packets before it's sent over the network; each packet is transmitted individually and is able to follow different routes to its destination. |
|
|
Term
PAP (Password Authentication Protocol) |
|
Definition
An insecure authentication method used by the Point to Point Protocol (PPP) for remote dial-up access. |
|
|
Term
|
Definition
Applications you use (or attackers use) to attempt to determine or decipher the passwords associated with user accounts. |
|
|
Term
PAT (Port Address Translation) |
|
Definition
Translates TCP or UDP communications made between hosts on a private network and hosts on a public network, allowing a single public IP address to be used by many hosts on a private network. |
|
|
Term
|
Definition
Temporary or quick fix designed to fix a security vulnerability, compatibility or operating issue. |
|
|
Term
|
Definition
Consists of several client computers that are connected to a network for simple file and printer sharing in a small office or home office. |
|
|
Term
|
Definition
An attack where an e-mail that appears to be from a trusted sender directs the recipient to a Web site that looks like the company's site they are impersonating and then records the user's logon information. |
|
|
Term
|
Definition
A material object, such as a smart card, that stores a cryptographic key, which might be a digital signature or biometric data. |
|
|
Term
PKI (public key infrastructure) |
|
Definition
A formalized and feature rich system for sharing public keys, distributing certificates, and verifying the integrity and authenticity of these components and their issuers. |
|
|
Term
|
Definition
Original, unencrypted information. |
|
|
Term
|
Definition
An enclosure in a building that's used to move air for heating, cooling, or humidity control. |
|
|
Term
PoE (Power over Ethernet) |
|
Definition
A method for transferring both electrical power and data to remote devices over twisted-pair cable in an Ethernet network. |
|
|
Term
point-to-point connection |
|
Definition
There's a dedicated connection between two nodes—only those two nodes communicate over the connection. |
|
|
Term
POP3 (Post Office Protocol version 3) |
|
Definition
An OSI Application layer e-mail protocol used to download and delete messages from the mail server. |
|
|
Term
|
Definition
A number between 0 and 65,535 that identifies a program running on a computer. |
|
|
Term
|
Definition
A tool that examines a host or network to determine which ports are being monitored by applications on the scanned hosts. |
|
|
Term
POTS (plain old telephone service) |
|
Definition
The network of the world's public circuit-switched telephone networks (public switched telephone network—PSTN). |
|
|
Term
|
Definition
A lock that's opened or closed with a metal key, or by turning or pressing a button in the center. |
|
|
Term
|
Definition
A language that computers, servers, and network devices use to communicate with each other. |
|
|
Term
|
Definition
A server that acts as an intermediary between computers on a network and the Internet. |
|
|
Term
|
Definition
Used to terminate station cables and cross-connect to other punchdown locations. There are two types— the 110 block and the older 66M block. |
|
|
Term
|
Definition
A wireless technology that use signals sent over electromagnetic radio waves to transmit data between devices, allowing transmissions to pass through most nonmetallic obstructions and around corners. |
|
|
Term
RADIUS (Remote Access Dial-in User Service) |
|
Definition
Uses a specialized server for authentication and WEP for data encryption. |
|
|
Term
RARP (Reverse Address Resolution Protocol) |
|
Definition
Converts physical MAC addresses to logical IP addresses. |
|
|
Term
|
Definition
A defined namespace in RADIUS, which helps determine which server should be used to authenticate a connection request. |
|
|
Term
|
Definition
A basic internetworking device which boosts the electronic signal from one network cable segment or wireless LAN and passes it to another; helping you to physically extend network segments or wireless coverage. |
|
|
Term
|
Definition
Coaxial cable used to deliver cable television signals to and within homes. |
|
|
Term
|
Definition
50-ohm stranded core coaxial cables used for backbones. |
|
|
Term
|
Definition
75-ohm solid core cables with dual shielding (foil and braided wires) used for backbones. |
|
|
Term
|
Definition
Coaxial cabling used for Ethernet networks. |
|
|
Term
|
Definition
Coaxial cabling used for low-power video and RF signal connections. |
|
|
Term
|
Definition
Each node is connected to a central device by two wires. |
|
|
Term
RIP/RIP2 (Routing Information Protocol) |
|
Definition
An OSI Network layer protocol responsible for defining how paths are chosen through the internetworking of one computer to another and how routers can share information about the networks of which they are aware. |
|
|
Term
|
Definition
A TP cable where the wires in each end are the reverse of one another; used to connect a computer's serial port to the console port of a router or managed switch. |
|
|
Term
|
Definition
A symmetric cipher in which characters are replaced with the character whose ASCII value is thirteen higher. |
|
|
Term
|
Definition
An internetworking device that opens the MAC (Media Access Control) layer envelope and looks at the contents of the packet delivered at the MAC layer to make decisions on how to send data through the network. |
|
|
Term
|
Definition
|
|
Term
|
Definition
The best known asymmetric public key cipher where two users each generate a pair of keys: a private and public key pair. To send a secure message to the second user, the first user obtains the second user's public key and encrypts the message with it. Only second user's private key can be used to decrypt the message. |
|
|
Term
|
Definition
WAN connection technology that uses connections made by sending and receiving signals from satellites in orbit around the earth. |
|
|
Term
|
Definition
A router used to filter all traffic to the private intranet but also to allow full access to the computer in the DMZ. |
|
|
Term
|
Definition
Defines rules and practices that the organization puts in place to manage and protect information within the organization. |
|
|
Term
|
Definition
The portion of the network on either side of two network transmission devices. |
|
|
Term
|
Definition
A collection of updates as a single installation. |
|
|
Term
|
Definition
An OSI Application layer protocol used to secure Internet transmissions by securing the individual data packets themselves. |
|
|
Term
signal-regenerating repeater |
|
Definition
A repeater that reads the signal and then creates an exact duplicate of the original signal before sending it on. Also called an intelligent repeater. |
|
|
Term
|
Definition
Data is transmitted across the medium in a single direction. |
|
|
Term
|
Definition
Optic fibers which support only a single transmission path. |
|
|
Term
|
Definition
A user logs on once to gain access to multiple systems without being required to log on each time another system is accessed. |
|
|
Term
|
Definition
An IPv6 private address; begin with FE with C to F for the third hex digit. |
|
|
Term
|
Definition
Links the networks at two locations via the Internet. |
|
|
Term
SLA (service-level agreement) |
|
Definition
A contract documenting the service level between a service provider and the end user. |
|
|
Term
SMTP (Simple Mail Transfer Protocol) |
|
Definition
An OSI Application layer e-mail protocol used to send and receive e-mail messages between e-mail servers; and send e-mail from an e-mail client to an e-mail server. |
|
|
Term
|
Definition
An attack where a host is flooded with ICMP packets. |
|
|
Term
SNAT (source network address translation) |
|
Definition
The process that a router or firewall uses to rewrite source and destination addresses of IP packets as they pass through. |
|
|
Term
|
Definition
An attack which exploits trust in the real world between people to gain information that attackers can then use to gain access to computer systems. |
|
|
Term
SONET (Synchronous Optical NETwork) |
|
Definition
An ANSI standard protocol for signal transmission on optical networks, which is divided into categories based on a base signal (Synchronous Transport Signal or STS) and an optical carrier (OC) level. |
|
|
Term
|
Definition
An attack where a user appears to be a different user that is sending messages. Also, presenting credentials that don't belong to you in order to gain access to a system. |
|
|
Term
|
Definition
Software that gets installed on a system without the user's knowledge and gathers personal or other sensitive information; potentially changing the computer's configuration. |
|
|
Term
|
Definition
A popular tool for remote command-line system access and management, with current implementations supporting secure file transport (over Secure FTP, or SFTP). |
|
|
Term
|
Definition
A popular tool for remote command-line system access and management, with current implementations supporting secure file transport (over Secure FTP, or SFTP). |
|
|
Term
SSL (Secure Sockets Layer) |
|
Definition
An OSI Application layer public-key/private-key encryption protocol used to transmit data securely over the Internet over TCP/IP. |
|
|
Term
|
Definition
Each node is connected to a central network transmission device such as a hub or a switch, which serves as a distribution device. |
|
|
Term
|
Definition
A TP cable where both ends follow either 568A or 568B wiring standard. |
|
|
Term
|
Definition
Used to identify the network ID and host ID portions of an IP address. |
|
|
Term
|
Definition
Creating one large network from several smaller ones by taking bits from the network ID and giving them to the host ID. |
|
|
Term
|
Definition
Uses the same key to encrypt and decrypt a piece of data. |
|
|
Term
|
Definition
An attack where a server is inundated with half open TCP connections which prevent valid users from being able to access the server. |
|
|
Term
|
Definition
A leased digital communications line provided through a common carrier; the leased lines are permanent connections that use multiplexing, a process of dividing a single channel into multiple channels that can be used to carry voice, data, video, or other signals. Several variations of T-carrier lines are available; the most popular are T1 and T3 lines. |
|
|
Term
TACACS+ (Terminal Access Controller Access Control System) |
|
Definition
A proprietary authentication protocol developed by Cisco Systems that provides centralized and scalable authentication, along with authorization and accounting functions. |
|
|
Term
TCP (Transmission Control Protocol) |
|
Definition
An OSI Transport layer protocol used to transmit information across the Internet, providing acknowledged, connection-oriented communications, as well as guaranteed delivery, proper sequencing, and data integrity checks. |
|
|
Term
TCP/IP (Transmission Control Protocol/Internet Protocol) |
|
Definition
A routable, non-proprietary protocol that's the protocol of the Internet, and the predominant Windows network protocol. |
|
|
Term
|
Definition
A four-layer reference model is used to describe the TCP/IP protocol suite. |
|
|
Term
|
Definition
An attacker takes over an established session between two nodes that are already communicating. |
|
|
Term
TDR (time domain reflector) |
|
Definition
A device used to verify impedance and termination in a cable. |
|
|
Term
|
Definition
An OSI Application layer terminal emulation protocol that is primarily used to remotely connect to UNIX and Linux Systems. |
|
|
Term
TFTP (Trivial File Transfer Protocol or Trivial FTP) |
|
Definition
An OSI Application layer protocol used to send and receive files to a single computer or multiple computers simultaneously. |
|
|
Term
three-factor authentication |
|
Definition
Authentication based on three items; typically something you know, something you have, and something you are. |
|
|
Term
|
Definition
The entry point to the DMZ requires three network cards—one network card is connected to the Internet, one to the DMZ network (or perimeter network), and the final network card to the intranet. Traffic is never allowed to flow directly from the Internet to the private intranet without filtering through the DMZ. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Software that controls network traffic in order to optimize performance or increase usable bandwidth. Also called a bandwidth shaper. |
|
|
Term
|
Definition
An application designed to appear harmless, but delivers malicious code to a computer. |
|
|
Term
|
Definition
Composed of four pairs of copper wires, with the wires in each pair are twisted around each other, then twisted together and bundled within a covering. |
|
|
Term
two-factor authentication |
|
Definition
Authentication based on two items; typically something you know plus either "something you have" or "something you consist of." |
|
|
Term
UDP (User Datagram Protocol) |
|
Definition
An OSI Transport layer protocol used to provide connectionless, unacknowledged communications. |
|
|
Term
|
Definition
Enhancement to the operating system and some of its features. |
|
|
Term
|
Definition
The ability of a single network adapter in a switch to virtualize "n" number of network adapters. |
|
|
Term
|
Definition
Used to make telephone calls over a data network such as the Internet. |
|
|
Term
VPN (Virtual private network) |
|
Definition
WAN connection technology that uses encryption and security protocols to create a private network over a public network. |
|
|
Term
|
Definition
The process of marking buildings, curbs, and other landmarks indicating the presence of an available access point and its connection details by utilizing a set of symbols and shorthand. |
|
|
Term
|
Definition
Driving around with a laptop system configured to listen for open wireless access points. |
|
|
Term
|
Definition
Users are tricked into visiting a Web site that looks and acts like an official, legitimate Web site. The imposter Web site is set up to dupe the victim into providing information such as user names, passwords, credit card numbers, and other personal information. |
|
|
Term
WEP (Wired Equivalent Privacy) |
|
Definition
A wireless encryption technology which uses a 64-bit or 128-bit symmetric encryption cipher where a key is configured on both the WAP and the client. |
|
|
Term
Wi-Fi (Wireless Fidelity) |
|
Definition
The most widely used wireless technology at present; began as 802.11b IEEE standard, although most implementations have been upgraded to use the newer 802.11g. |
|
|
Term
|
Definition
A hacker configures his or her computer to present itself as a wireless router to intercept a user's communication. |
|
|
Term
WiMAX (IEEE 802.16 Air Interface Standard) |
|
Definition
A point-to-multipoint broadband wireless access standard that's emerging as the wireless connection standard for long distances. |
|
|
Term
Wireless Auto Configuration |
|
Definition
Windows clients dynamically select the wireless network to which a connection |
|
|
Term
|
Definition
Uses radio waves or infrared light instead of cables to connect network nodes. |
|
|
Term
|
Definition
A horizontal cable run without splice points, cable junctures, or taps to an individual workstation. |
|
|
Term
|
Definition
A program that replicates itself over the network without a user's intervention. |
|
|
Term
WPA (Wi-Fi Protected Access) |
|
Definition
A wireless encryption technology that uses the RC4 symmetric cipher with a 128-bit key. WPA Personal uses a "pre-shared key" (PSK), which simply means you must enter a passphrase onto both the AP and clients. |
|
|
Term
|
Definition
Packet-switching communication protocol designed for long-distance analog data transmission rather than the circuit-switching technology used by the telephone system. |
|
|