Term
|
Definition
A temporary storage area. |
|
|
Term
|
Definition
IP addresses that are split between the network and host portions set on the boundaries between the bytes. |
|
|
Term
|
Definition
Unifying voice and data traffic over a single Internet Protocol (iP network). |
|
|
Term
|
Definition
Switches that reside at the top of the hierarchy and carry traffic between switches. |
|
|
Term
|
Definition
A separate network that sits outside the secure network perimeter, often used to provide “outside services" such as web service and e-mail. |
|
|
Term
|
Definition
A server intended to trap or trick attackers. |
|
|
Term
host intrusion prevention systems (HIPS) |
|
Definition
Intrusion prevention systems that are installed on local systems. |
|
|
Term
integrated network security hardware |
|
Definition
A hardware device that integrates multipurpose security appliances with traditional network device such as a switch or router. |
|
|
Term
|
Definition
A technology to monitor Internet traffic and block access to preselected web sites and files. |
|
|
Term
intrusion prevention system (IPS) |
|
Definition
a system that finds malicious traffic and deals with it immediately. |
|
|
Term
|
Definition
adding digital voice clients and new voice applcations onto the IP network. |
|
|
Term
|
Definition
Services such as voice, video, and data combined and transported under a universial format. |
|
|
Term
network access control (NAC) |
|
Definition
a technology that examines the current state of a system and corrects any deficiencies before it is allowed to connect to the network. |
|
|
Term
network address translation (NAT) |
|
Definition
A technology that hides the iP addresses of network devices from attackers. |
|
|
Term
network intrusion detection system (NIDS) |
|
Definition
A system to monitor and possibly prevent attempts to attack a local system. |
|
|
Term
network intrusion prevention systems (NIPS) |
|
Definition
Intrusion prevention systems that work to protect the entire network and all devices that are connected to it. |
|
|
Term
|
Definition
Using a separate data stream. |
|
|
Term
port address translation (PAT) |
|
Definition
A variation of network address translation (NAT) that assigns a different TCP port number to each packet. |
|
|
Term
|
Definition
IP addresses that are not assigned to any specific user or organization but can be used by any user on the private internal network. |
|
|
Term
|
Definition
A honeypot that is used mainly by organizations to capture limited information regarding attacks on that organizationÂ’s honeypot. |
|
|
Term
|
Definition
A computer system (or an application program) that intercepts internal user requests and then processes that request on behalf of the user. |
|
|
Term
|
Definition
A honeypot that is more complex and used primarily by research, military, and government organizations. |
|
|
Term
|
Definition
A device that routes incoming requests to the correct server. |
|
|
Term
|
Definition
The rules that establishes what action the firewall should take when it receives a packet. |
|
|
Term
stateful packet filtering |
|
Definition
A firewall technology that keeps a record of the state of a connection between an internal computer and an external server and then makes decisions based on the connection as well as the rule base. |
|
|
Term
stateless packet filtering |
|
Definition
A firewall technology that looks it the 1ncoming packet and permits or denies it based strictly on the rule base. |
|
|
Term
|
Definition
An IP addressing technique in which an IP address can be split anywhere within its 32 bits. |
|
|
Term
|
Definition
An IP addressing technique in which an IP address can be split anywhere within its 32 bits. |
|
|
Term
|
Definition
An instruction that interrupts the program being executed and requests a service from the operating system. |
|
|
Term
|
Definition
Segmenting a network by separating devices into logical groups. |
|
|
Term
|
Definition
A technology that places voice traffic onto an IP network. |
|
|
Term
|
Definition
Switches that are connected directly to the devices on the network. |
|
|