Term
|
Definition
Value of an SNMP management information base (MIB) object. That value can be read with a Get PDU or changed with a Set PDU. |
|
|
Term
variable-length subnet masking (VLSM) |
|
Definition
The basis of allocating and routing classless addresses, not restricting subnet masks to /8, /16, or /24, which classful addressing did. Based on variable-length subnet masking (VLSM), where subnets can be allocated according to the needs of an organization, such as /26 for a network with 254 or fewer node, or /30 for a network with only two nodes. |
|
|
Term
|
Definition
Main patch panel in a telecommunications room. |
|
|
Term
very-high-bit-rate DSL (VDSL) |
|
Definition
The latest form of DSL with download and upload speeds of up to 100 Mbps. VDSL was designed to run on copper phone lines, but many VDSL suppliers use fiber-optic cabling to increase effective distances. |
|
|
Term
|
Definition
Security measures that use remotely monitored visual systems that include IP cameras and closed-circuit televisions (CCTVs). |
|
|
Term
video teleconferencing (VTC) |
|
Definition
The classic, multicast-based presentation where one presenter pushes out a stream of video to any number of properly configured and properly authorized multicast clients. |
|
|
Term
virtual desktop infrastructure (VDI) |
|
Definition
Technologies that use virtual machines to provide and manage virtual desktops. VDI can provide benefits like flexible management when the desktop VMs are centralized on a smaller number of servers. |
|
|
Term
|
Definition
Block-level storage provided via a storage area network (SAN) that functions for the client computer as a physical, directly attached hard drive. |
|
|
Term
|
Definition
A firewall that is implemented in software within a virtual machine in cases where it would be difficult, costly, or impossible to install a traditional physical firewall. |
|
|
Term
|
Definition
A single IP address shared by multiple systems. This is commonly the single IP address assigned to a home or organization that uses NAT to have multiple IP stations on the private side of the NAT router. Virtual IP addresses are also used by First Hop Redundancy Protocol (FHRP). |
|
|
Term
virtual local area network (VLAN) |
|
Definition
A common feature among managed switches that enables a single switch to support multiple Layer 2 broadcast domains and provide isolation between hosts on different VLANs. Critical for modern network performance and security. |
|
|
Term
|
Definition
A virtual computer accessed through a class of programs called a hypervisor or virtual machine monitor. A virtual machine runs inside your actual operating system, essentially enabling you to run two or more operating systems at once. |
|
|
Term
virtual machine monitor (VMM) |
|
Definition
In virtualization, a layer of programming that creates, supports, and manages a virtual machine. |
|
|
Term
Virtual Network Computing (VNC) |
|
Definition
A remote access program and protocol. |
|
|
Term
virtual network interface card (vNIC) |
|
Definition
Software-based NIC that functions identically to a physical NIC and uses a software connection to pass traffic from the real NIC to the virtual one. |
|
|
Term
|
Definition
Software that functionally replaces a physical PBX telephone system. |
|
|
Term
virtual private network (VPN) |
|
Definition
A network configuration that enables a remote user to access a private network via the Internet. VPNs employ an encryption methodology called tunneling, which protects the data from interception. |
|
|
Term
|
Definition
A router that is implemented in software within a virtual machine. The scalability of a virtual machine makes it easy to add capacity to the router when it is needed. Virtual routers are easily managed and are highly scalable without requiring the purchase of additional network hardware. |
|
|
Term
Virtual Router Redundancy Protocol (VRRP) |
|
Definition
Open standard FHRP that provides high availability by taking multiple routers and grouping them together into a single virtual router with a single virtual IP address that clients use as a default gateway. See First Hop Redundancy Protocol (FHRP). |
|
|
Term
|
Definition
Software that performs Layer 2 switching within a hypervisor and enables virtual machines (VMs) to communicate with each other without going outside of the host system. |
|
|
Term
|
Definition
Generally, the process of running software (called a hypervisor) on a host computer to create a virtual machine (VM) that models (virtualizes) the hardware you’d find on a physical computer. Also, a pattern that involves replacing existing components with software (virtual) versions that are roughly indistinguishable to any programs, devices, or users that interact with them. |
|
|
Term
virtualized network functions (VNFs) |
|
Definition
Network functions such as firewalls, load balancers, and routers that are run using network function virtualization infrastructure (NFVI). |
|
|
Term
virtualized network function components (VNFCs) |
|
Definition
Virtual machines (or containers) that can be interconnected to work collectively as a VNF, such as a VPN concentrator or firewall. |
|
|
Term
|
Definition
A program that can make a copy of itself on a system without the user being aware of it. All viruses carry some payload that may or may not do something malicious. Computer viruses generally require a host file or program to run. |
|
|
Term
virus definition or data files |
|
Definition
Enables the virus protection software to recognize the viruses on your system and clean them. These files should be updated often. Also called signature files, depending on the virus protection software in use. |
|
|
Term
|
Definition
Anti-malware program that passively monitors a computer’s activity, checking for viruses only when certain events occur, such as a program executing or a file being downloaded. |
|
|
Term
|
Definition
A Layer 2 attack that enables an attacker to access hosts on a VLAN the attacker is not a part of. Traditionally this attack used switch spoofing or double tagging. |
|
|
Term
|
Definition
A method to load-balance wireless network clients associated with a single SSID. Distributes clients across many VLANs to avoid excessive levels of broadcast traffic. |
|
|
Term
VLAN Trunking Protocol (VTP) |
|
Definition
Cisco proprietary protocol to automate the process of syncing VLANs across switches. |
|
|
Term
|
Definition
Using an IP network to conduct voice calls. |
|
|
Term
|
Definition
Interface between a traditional switched telephone network and a VoIP service provider. |
|
|
Term
|
Definition
A private branch exchange that uses VoIP instead of the traditional switched telephone circuits. |
|
|
Term
|
Definition
Unit of measurement for voltage. |
|
|
Term
|
Definition
The pressure of the electrons passing through a wire. |
|
|
Term
|
Definition
Tracks voltage over time by plugging into a power outlet. Also known as a voltage quality recorder |
|
|
Term
|
Definition
A server program that supports many VPN connections (L2TP, SSL VPN, etc.). Typically part of a VPN-capable router. |
|
|
Term
|
Definition
A connection over the Internet between a client and a server; the VPN tunnel enables the client to access remote resources as if they were local, securely. |
|
|
Term
|
Definition
A potential weakness in an infrastructure that a threat actor might exploit. |
|
|
Term
|
Definition
The ongoing process of identifying vulnerabilities and dealing with them. |
|
|
Term
|
Definition
A tool that scans a network for potential attack vectors. |
|
|
Term
|
Definition
A geographically dispersed network created by linking various computers and LANs over long distances, generally using leased phone lines. There is no firm dividing line between a WAN and a LAN. |
|
|
Term
|
Definition
Facility with all of the physical resources, computers, and network infrastructure to recover from a primary site disaster. A warm site does not have current backup data and it may take a day or more to recover and install backups before business operations can recommence. |
|
|
Term
|
Definition
The amount of amps and volts needed by a particular device to function. |
|
|
Term
|
Definition
In the context of laser pulses, the distance the signal has to travel before it completes its cyclical oscillation and starts to repeat. Measured in nanometers, wavelength can be loosely associated with colors. |
|
|
Term
|
Definition
A server that speaks the HTTP protocol, often secured with TLS. Historically used to deliver only HTML Web sites, has since became the backbone for almost all network-based apps. |
|
|
Term
|
Definition
Applications and processes that can be accessed over a network, rather than being accessed locally on the client machine. Web services include things such as Web-based e-mail, network-shareable documents, spreadsheets and databases, and many other types of cloud-based applications. |
|
|
Term
|
Definition
Port numbers from 0 to 1023 that are used primarily by client applications to talk to server applications in TCP/IP networks. |
|
|
Term
|
Definition
A geographically dispersed network created by linking various computers and LANs over long distances, generally using leased phone lines. There is no firm dividing line between a WAN and a LAN. |
|
|
Term
|
Definition
An 802.11 standard (marketed as Wi-Fi 4) that increases transfer speeds and adds support for multiple input/multiple output (MIMO) by using multiple antennas. 802.11n can operate on either the 2.4- or 5-GHz frequency band and has a maximum throughput of 400 Mbps. Superseded by 802.11ac, but used with many IoT devices. |
|
|
Term
|
Definition
A wireless standard that operates in the frequency range of 5 GHz and offers throughput of up to 1 Gbps. 802.11ac is marketed as Wi-Fi 5. |
|
|
Term
|
Definition
Wireless standard that brings improvements in high-density areas such as stadiums and conferences in comparison to previous standards. Marketed as both Wi-Fi 6 and Wi-Fi 6E. Wi-Fi 6 operates at the 2.4-GHz and 5-GHz bands, while Wi-Fi 6E operates at the 6-GHz band. 802.11ax offers a maximum throughput of up to 10 Gbps. |
|
|
Term
|
Definition
The most widely adopted wireless networking type in use today. Technically, only wireless devices that conform to the extended versions of the 802.11 standard—802.11a, b, g, n, ac, and ax—are Wi-Fi certified. |
|
|
Term
|
Definition
Any device that finds and documents all wireless networks in the area. |
|
|
Term
Wi-Fi Protected Access (WPA) |
|
Definition
A wireless security protocol that addresses weaknesses and acts as an upgrade to WEP. WPA offers security enhancements such as dynamic encryption key generation (keys are issued on a per-user and per-session basis), an encryption key integrity-checking feature, user authentication through the industry-standard Extensible Authentication Protocol (EAP), and other advanced features that WEP lacks. WPA has been replaced by the more secure WPA2. |
|
|
Term
Wi-Fi Protected Access 2 (WPA2) |
|
Definition
Consumer name for the IEEE 802.11i standard and the replacement for the WPA protocol. It uses the Advanced Encryption Standard algorithm, making it much harder to crack than its predecessor. |
|
|
Term
Wi-Fi Protected Access 3 (WPA3) |
|
Definition
Wireless encryption standard that is replacing WPA2. Uses Simultaneous Authentication of Equals (SAE), a key exchange based on Diffie-Hellman that generates unique encryption keys between each client and WAP. |
|
|
Term
Wi-Fi Protected Setup (WPS) |
|
Definition
Automated and semi-automated process to connect a wireless device to a WAP. The process can be as simple as pressing a button on the device or pressing the button and then entering a PIN code. WPS is particularly vulnerable to brute force attacks. |
|
|
Term
Windows Defender Firewall |
|
Definition
The firewall that has been included in Windows operating systems since Windows XP SP2; originally named Internet Connection Firewall (ICF) but renamed in subsequent versions of Windows. |
|
|
Term
|
Definition
A group of computers controlled by a computer running a Windows Server operating system with the Active Directory Domain Controller role installed. |
|
|
Term
|
Definition
A test for copper cables that checks not only for continuity but also that all the wires on both ends of the cable connect to the right spot. A wire map will also pick up shorts and crossed wires. |
|
|
Term
|
Definition
A document that usually consists of multiple pages and that shows the following: how the wires in a network connect to switches and other nodes, what types of cables are used, and how patch panels are configured. It usually includes details about each cable run. |
|
|
Term
|
Definition
In a basic structured cabling network, often simply an office or cubicle that potentially contains a PC attached to the network. |
|
|
Term
|
Definition
A convenient method of organizing computers under Network/My Network Places in Windows operating systems. |
|
|
Term
|
Definition
Computer that a person physically uses to accomplish their work. Often a general computer, but workstations for some occupations need specialized hardware. Traditionally, workstations were stationary computers that were small and cheap enough for it to be practical to set one up at an employee’s physical workstation (in contrast to shared mini/mainframe computers that took up one or more server racks). |
|
|
Term
|
Definition
A form of malware. Unlike a classic virus, a worm does not infect other files on the computer. Instead, it autonomously replicates by infecting systems over a network by taking advantage of security weaknesses in networking protocols. |
|
|
Term
|
Definition
A wireless security protocol that addresses weaknesses and acts as an upgrade to WEP. WPA offers security enhancements such as dynamic encryption key generation (keys are issued on a per-user and per-session basis), an encryption key integrity-checking feature, user authentication through the industry-standard Extensible Authentication Protocol (EAP), and other advanced features that WEP lacks. WPA has been replaced by the more secure WPA2. |
|
|
Term
|
Definition
Consumer name for the IEEE 802.11i standard and the replacement for the WPA protocol. It uses the Advanced Encryption Standard algorithm, making it much harder to crack than its predecessor. |
|
|
Term
|
Definition
A version of WPA2 that uses a RADIUS server for authentication. |
|
|
Term
|
Definition
Wireless encryption standard that is replacing WPA2. Uses Simultaneous Authentication of Equals (SAE), a key exchange based on Diffie-Hellman that generates unique encryption keys between each client and WAP. |
|
|
Term
|
Definition
Automated and semi-automated process to connect a wireless device to a WAP. The process can be as simple as pressing a button on the device or pressing the button and then entering a PIN code. WPS is particularly vulnerable to brute force attacks. |
|
|
Term
|
Definition
A vast network of servers and clients communicating through the Hypertext Transfer Protocol (HTTP). Commonly accessed using graphical Web-browsing software such as Mozilla Firefox and Google Chrome. |
|
|
Term
|
Definition
An operation commonly used in cryptography. XOR takes two input bits and outputs one bit. If the input bits are the same, the output is 0, while if they are different, the output is 1. |
|
|
Term
|
Definition
Cable used to interface with a Cisco device. |
|
|
Term
zero-configuration networking (zeroconf) |
|
Definition
Automatically generated IP addresses in the 168.254.0.0/16 subnet when a DHCP server is unreachable. |
|
|
Term
|
Definition
New attack that exploits a vulnerability that has yet to be identified. |
|
|
Term
|
Definition
A cybersecurity paradigm focused on resource protection and the premise that trust is never granted implicitly but must be continually evaluated. |
|
|
Term
|
Definition
Wireless home automation control standard. |
|
|
Term
|
Definition
A single computer under the control of an operator that is used in a botnet attack. |
|
|
Term
|
Definition
Wireless home automation control standard. |
|
|