Term
| 10-Mbps Ethernet (Twisted Pair Ethernet) |
|
Definition
| Ethernet standard operating at a speed of 10 megabits per second (Mbps) of data. |
|
|
Term
| 100-Mbps Ethernet (Fast Ethernet) |
|
Definition
| Ethernet standard operating at a speed of 100 Mbps. |
|
|
Term
| 1000-Mbps Ethernet (Gigabit Ethernet) |
|
Definition
| Used for large, high-speed LANs and heavy-traffic server connections; it operates at a speed of 1000 Mbps (1 gigabit per second). |
|
|
Term
| 10GbE (10 Gigabit Ethernet) |
|
Definition
| The fastest of the Ethernet standards, with a data rate of 10 gigabits per second. |
|
|
Term
|
Definition
| A port-based, authentication framework for wired and wireless access to Ethernet networks. |
|
|
Term
|
Definition
| An improved version of the original Wi-Fi technology and is also based on the same IEEE 802 standard. |
|
|
Term
| ACL (access control list) |
|
Definition
| Controls the permissions to allow or deny user access to a folder or printer. |
|
|
Term
|
Definition
| A repeater that simply amplifies all incoming signals and passes them on. |
|
|
Term
|
Definition
| An IPv6 address that identifies a group of interfaces, typically on separate nodes, and then delivers anycast packets to the nearest interface as identified by the routing protocol distance measurement. |
|
|
Term
| APIPA (Automatic Private IP Addressing) |
|
Definition
| The non-routable network 169.254.0.0 used by Windows clients to automatically generate an address in this range if they are configured to obtain an IPv4 address from a DHCP server and are unable to contact one. |
|
|
Term
|
Definition
| A routable network protocol supported by Apple Macintosh computers. |
|
|
Term
| ARP (Address Resolution Protocol) |
|
Definition
| Converts logical IP addresses to physical MAC addresses as part of the packet delivery process. |
|
|
Term
| ATM (Asynchronous Transfer Mode) |
|
Definition
| A very fast network technology that can be used with LANs as well as WANs; it uses fixed-length packets, called cells, to transmit data, voice, video, and frame relay traffic across virtual circuits. |
|
|
Term
|
Definition
| Positive identification of the entity, either a person or a system, that wants to access information or services that have been secured. |
|
|
Term
|
Definition
| A set level of access granted to an entity so that it can access the resource. |
|
|
Term
|
Definition
| The DMZ network is located between two firewalls, the two firewalls between the Internet and the DMZ, and the DMZ and the intranet each have two network cards, as does the server within the DMZ. |
|
|
Term
|
Definition
| A high-speed network link connecting network segments. |
|
|
Term
|
Definition
| Ethernet standards run over shielded copper twisted-pair cable. |
|
|
Term
|
Definition
| Ethernet standards run over fiber optic cable. |
|
|
Term
|
Definition
| Ethernet standards run over shielded or unshielded twisted-pair cable. |
|
|
Term
|
Definition
| Ethernet standards run over fiber optic cables; uses the same types of fiber and support the same distances as 10GBASE-R standards; however, Ethernet frames are encapsulated in SONET frames. Referred to as Wide Area Network Physical Layer (WAN PHY). |
|
|
Term
|
Definition
| Ethernet standards run over fiber optic cable. |
|
|
Term
|
Definition
| Computers that stand outside the protected network and are exposed to an attack by using two network cards, one for the DMZ and one for the intranet. Network communication isn't allowed between the two network cards in the bastion host server. |
|
|
Term
|
Definition
| Uses something about a user, such as a fingerprint, retinal scan, or voice print, to secure an account or resource. |
|
|
Term
|
Definition
| A short-range wireless technology limited to transmission distances of about 100 meters or less. |
|
|
Term
|
Definition
| An internetworking device that connects two different LANs and makes them appear to be one; or segments a larger LAN into two smaller pieces. |
|
|
Term
|
Definition
| An attack which manipulates the maximum field input size variable and then enters data much larger than the database is prepared to accept causing memory reserved for other data to be overwritten. |
|
|
Term
|
Definition
| Each node is connected to the next by a direct line so that a continuous line is formed. |
|
|
Term
| CA (certificate authority) |
|
Definition
| The person or entity responsible for issuing certificates. |
|
|
Term
|
Definition
| WAN connection technology that connects over the same lines that carry cable television signals. |
|
|
Term
|
Definition
| A device used to find cable faults. Comes in analog and digital versions. |
|
|
Term
|
Definition
| A device used to detect cables hidden behind walls or underground. |
|
|
Term
|
Definition
| A device used to verify that each TP wire is connected to the correct pin. |
|
|
Term
|
Definition
| WAN connection technology that connects through a cell phone or laptop's cellular network PC card on a cellular phone network. |
|
|
Term
|
Definition
| Determines the physical methodology by which data is sent across the transmitting media. |
|
|
Term
| CHAP (Challenge Handshake Authentication Protocol) |
|
Definition
| An authentication method used by Point-to-Point Protocol (PPP) servers. CHAP validates the remote client's identity at the communication session start or at any time during the session. |
|
|
Term
| CIDR (Classless Inter-Domain Routing) |
|
Definition
| Allows you to use variable-length subnet masking (VLSM) to create additional addresses beyond those allowed by the IPv4 classes. |
|
|
Term
|
Definition
| A dedicated line is allocated for the transmission of data between two network nodes. |
|
|
Term
|
Definition
| A network with computers called servers, which hold data and provide a wealth of services that users can share. |
|
|
Term
|
Definition
| Contains a layer of braided wire or foil between the core and the outside insulating layer. |
|
|
Term
|
Definition
| Combines Cat5 or Cat6 and other transmission cables within a single PVC jacket. |
|
|
Term
|
Definition
| The point in a horizontal run where two cables are interconnected using a reusable connector such as a punch-down block. |
|
|
Term
|
Definition
| A device used to verify an electrical connection between two points. |
|
|
Term
| CRL (certificate revocation list) |
|
Definition
| A data structure containing revoked certificates. |
|
|
Term
|
Definition
| A location where signals are distributed to various destinations. |
|
|
Term
|
Definition
| A TP cable where one end is wired using 568A and the other using 568B, allowing you to directly connect two computers. |
|
|
Term
|
Definition
| Alternating electrical current flowing through a wire creates an electromagnetic field around the wire which affects the current flow in any adjacent cables. |
|
|
Term
|
Definition
| Maintains a database, or repository, of certificates. |
|
|
Term
| CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) |
|
Definition
| Channel access method which doesn't detect collisions as much as it attempts to avoid collisions. |
|
|
Term
| CSMA/CD (Carrier Sense Multiple Access with Collision Detection) |
|
Definition
| The most common implementation of channel access; includes carrier sensing, multiple access, and collision detection. Examples include: Ethernet and 802.3. |
|
|
Term
| CSU/DSU (Channel Service Unit/Digital Service Unit) |
|
Definition
| A two-in-one device that cleans and formats data before sending it on a T1 line. The Channel Service Unit (CSU) acts as a safe electrical buffer between the LAN and a public network accessed by the T1 line. The Digital Service Unit or Data Service Unit (DSU) ensures that the data is formatted correctly before it's allowed on the T1 line. |
|
|
Term
|
Definition
| Creating several smaller networks from a large network by taking bits from the host ID and adding them to the network ID. |
|
|
Term
|
Definition
| A Performance Monitor feature that gathers information for a period you specify so that you can review a computer's performance over time. |
|
|
Term
| DDoS (Distributed Denial of Service) |
|
Definition
| A network attack in which the attacker manipulates several hosts to perform a DoS attack. |
|
|
Term
|
Definition
| A network between two routers that uses another network protocol other than TCP/IP. |
|
|
Term
|
Definition
| The point at which the communications network owned by one company connects to the communications network owned by another company. Also called demarcation point. |
|
|
Term
| demarc terminating device |
|
Definition
| Device responsible for the code and protocol conversions, as well as the buffering required for communications to and from an ISP and your internal network. Also referred to as the network terminating interface (NTI), network terminating unit (NTU), network terminating device (NTD), smart jack, or an MPOE (minimum point of entry). |
|
|
Term
|
Definition
| The process a modem uses to convert analog data received from a phone line to digital. |
|
|
Term
| DHCP (Dynamic Host Configuration Protocol) |
|
Definition
| An automated mechanism to assign IP addresses to clients. There are two version—the original DHCP, which is used for IPv4 addressing, and Dynamic Host Configuration Protocol for IPv6 (DHCPv6), which is used for IPv6 addressing. |
|
|
Term
|
Definition
| A successor to RADIUS; a new protocol which defines a minimum set of AAA services and functionality. |
|
|
Term
|
Definition
| An area between the private network (intranet) and a public network (extranet) such as the Internet. |
|
|
Term
|
Definition
| Used to resolve host names to IP addresses, find domain controllers, as well as resources on the Internet such as Web servers and e-mail servers. |
|
|
Term
|
Definition
| An attack which consumes or disables resources so that services to users are interrupted. |
|
|
Term
| DSL (Digital Subscriber Line) |
|
Definition
| WAN connection technology that uses high-speed connections made over regular analog phone lines. |
|
|
Term
|
Definition
| Digging useful information out of an organization's trash bin. |
|
|
Term
|
Definition
| WAN connection technology that uses a modem to connect through regular, analog phone lines. |
|
|
Term
|
Definition
| The European equivalent of the American T-lines. |
|
|
Term
| EAP (Extensible Authentication Protocol) |
|
Definition
| Includes multiple authentication methods, such as token cards, one-time passwords, certificates, and biometrics, and runs over the data link layers without requiring use of IP. |
|
|
Term
|
Definition
| A technique through which source information is converted into a form that cannot be read by anyone other than the intended recipient. |
|
|
Term
|
Definition
| Combines the bandwidth of two network interface cards as a cost-effective way to increase bandwidth available for data transfers for critical servers, such as firewalls and production servers. |
|
|
Term
|
Definition
| An internetworking device that takes the signal transmitted from one computer and propagates it to all the other computers on the network configured as an Ethernet star. |
|
|
Term
|
Definition
| The Windows logging utility. |
|
|
Term
|
Definition
| A biometric hardware security device that scans the surface of a user's retina to obtain the blood vessel patterns found there, then compares it to a database of user names and passwords. |
|
|
Term
|
Definition
| Carries light-based data through strands of glass or plastic. |
|
|
Term
|
Definition
| A biometric hardware security device that scans a user's finger and compares the print to a database of user names and passwords. |
|
|
Term
|
Definition
| Software or hardware used to control information that's sent and received from outside the network. |
|
|
Term
|
Definition
| Packet-switching communication protocol designed for long-distance digital data transmission rather than the circuit-switching technology used by the telephone system. |
|
|
Term
| FTP (File Transfer Protocol) |
|
Definition
| An OSI Application layer protocol used to upload and download files, as well as request directory listings from remote servers. |
|
|
Term
|
Definition
| Data can be transmitted across the medium in both directions at the same time. |
|
|
Term
|
Definition
| A routable and reachable address on the IPv6 Internet; beginning with the binary values 001 (2000::/3) through 111 (E000::/3). (The IPv6 version of an IPv4 public address.) |
|
|
Term
|
Definition
| Data is transmitted across the medium in both directions, but only in one direction at a time. |
|
|
Term
|
Definition
| The process of modifying an operating system's default configuration to make it more secure from outside threats. |
|
|
Term
|
Definition
| A unique fixed-length mathematical derivation of a plaintext message. |
|
|
Term
| HIDS (host intrusion detection systems) |
|
Definition
| Typically software based systems for monitoring the health and security of a particular host. HIDS monitor operating system files for unauthorized changes, watch for unusual usage patterns, or failed logon requests. |
|
|
Term
|
Definition
| The junction point for the workstation cables. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| The portion of an IP address which represents a unique host on a network. |
|
|
Term
|
Definition
| Fixes errors in the operating system code. |
|
|
Term
| HTTP (Hypertext Transfer Protocol) |
|
Definition
| An OSI Application layer protocol which defines the commands that Web browsers can send and how Web servers are capable of responding. |
|
|
Term
|
Definition
| Two or more different types of network topologies are combined together into one network. |
|
|
Term
| ICMP/ICMP6 (Internet Control Messaging Protocol) |
|
Definition
| An OSI Network layer protocol used to send IP error and control messages between routers and hosts. |
|
|
Term
| IDF (intermediate distribution frame) |
|
Definition
| A network rack containing the devices connecting a floor's internal wiring to the MDF. |
|
|
Term
| IDS (intrusion detection system) |
|
Definition
| Installed inside your network to monitor both internal traffic and traffic that has passed through your firewall; it uses a monitoring port to look at data packets sent on the network. |
|
|
Term
|
Definition
| A UNIX-based version of IPCONFIG—a command-line utility used to display and modify the current TCP/IP stack. |
|
|
Term
| IGMP (Internet Group Management Protocol) |
|
Definition
| An OSI Network layer protocol used for the management of multicast groups. |
|
|
Term
| IMAP4 (Internet Message Access Protocol version 4) |
|
Definition
| An OSI Application layer e-mail protocol used to retrieve e-mail messages; provides more features than POP3. |
|
|
Term
|
Definition
| A wireless technology that uses pulses of invisible infrared light to transmit signals between devices, offering relatively low-speed, line-of-sight connections between devices. |
|
|
Term
|
Definition
| The process of calculating and recording checksums to protect against viruses and worms. |
|
|
Term
|
Definition
| An unreliable connectionless protocol, functioning at the Network layer of the OSI model. |
|
|
Term
|
Definition
| A command-line utility used to display and modify the current TCP/IP stack. |
|
|
Term
| IPS (intrusion prevention system) |
|
Definition
| Installed on the perimeter of your network to monitor for and stop threats before they are passed on your network; shuts down suspicious traffic on the wire. |
|
|
Term
|
Definition
| A 32-bit address consisting of a series of four 8-bit numbers separated by periods, which identifies a computer, printer, or other device on a TCP/IP network, such as the Internet or an intranet. |
|
|
Term
|
Definition
| A 128-bit address, written in the hexadecimal equivalent values for each of its 16 bytes, which identifies a computer, printer, or other device on a TCP/IP network, such as the Internet or an intranet. |
|
|
Term
| IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange) |
|
Definition
| A routable, proprietary protocol that was the native protocol in early versions of Novell NetWare. |
|
|
Term
| ISDN (Integrated Services Digital Network) |
|
Definition
| Uses a telephone line to transmit data, but unlike POTS, the data isn't converted to analog form. An ISDN line is digital and consists of two phone circuits, both carried on one pair of wires along with a slower, third circuit used for control signals. |
|
|
Term
| ISP (Internet Service Provider) |
|
Definition
| A business that provides connectivity to the Internet. |
|
|
Term
|
Definition
| The primary authentication protocol used in Active Directory Domain Services environments. |
|
|
Term
|
Definition
| A piece of information that determines the result of an encryption algorithm. |
|
|
Term
|
Definition
| The stages a key goes through during its life: generation, distribution, storage, backup, and destruction. |
|
|
Term
|
Definition
| A specifically designed configuration of computers and other devices located within a confined area, such as a home or office building, and connected by wires or radio waves that permit the devices to communicate with one another to share data and services. |
|
|
Term
| LDAP (Lightweight Directory Access Protocol) |
|
Definition
| The industry-standard protocol for network directory services. |
|
|
Term
|
Definition
| An IPv6 self-assigned address using the Neighbor Discovery process. (The IPv6 version of IPv4's APIPA.) |
|
|
Term
|
Definition
| A device used to check cables for broken or shorted wires, and wall jack to network switch connections. |
|
|
Term
| MAC (Media Access Control) address |
|
Definition
| A unique address permanently embedded in a NIC by the manufacturer, used to identify the device on the LAN. |
|
|
Term
|
Definition
| An attack that tricks e-mail servers into sending data through a third node. |
|
|
Term
|
Definition
| A set of doors that are interlocked—when one door is opened, the other door can't be opened. |
|
|
Term
| MDF (main distribution frame) |
|
Definition
| A network rack that contains the devices used to manage the connections between external communication cables and the cables of your internal network. |
|
|
Term
|
Definition
| An internetworking device that provides a connection between one network media type and another without changing the channel access method. |
|
|
Term
|
Definition
| All nodes in the mesh have independent connections to all other nodes in the mesh. |
|
|
Term
|
Definition
| An internetworking device that combines Layer 2 data switching with Layer 3 routing using an application-specific integrated circuit (ASIC). |
|
|
Term
|
Definition
| A device that enables you to connect your computer to another computer through a phone line. |
|
|
Term
|
Definition
| Combining multiple dial-up links over POTS for redundancy or increased throughput. |
|
|
Term
|
Definition
| The process a modem uses to convert data into an analog signal to be sent over a phone line. |
|
|
Term
|
Definition
| The ongoing process of gathering information. |
|
|
Term
|
Definition
| An IPv4 or IPv6 address that sends information or services to all interfaces that are defined as members of the multicast group. |
|
|
Term
|
Definition
| Optic fibers which support many transmission (propagation) paths. |
|
|
Term
| MUTOA (Multiuser telecommunications outlet assembly) |
|
Definition
| Centrally mounted workstation outlets (in a wall, not the ceiling). |
|
|
Term
|
Definition
| Requires both the client and the server to authenticate to each other instead of just the client authenticating to the server like in other authentication systems. |
|
|
Term
| NAC (Network Access Control) |
|
Definition
| A process or architecture through which computers are verified to be in compliance, and brought into compliance if they fall short, before they are permitted access to the network. |
|
|
Term
| NAP (Network Access Point) |
|
Definition
| A major Internet connection point that's used to connect and route traffic between smaller commercial backbones. |
|
|
Term
| NAT (network address translation) |
|
Definition
| Modifies network address information in the packets it transmits from an internal network onto the Internet, allowing a single address from a router to rewrite originating IP addresses from the internal network so that they all appear to come from the router's IP address. |
|
|
Term
|
Definition
| A non-routable, proprietary Microsoft protocol that's supported in Windows 9x/Me, Windows NT, and Windows 2000. |
|
|
Term
|
Definition
| The portion of an IP address which represents the network on which a device resides. |
|
|
Term
|
Definition
| A simple protocol analyzer for Microsoft Windows operating systems. |
|
|
Term
| NEXT (near end crosstalk) |
|
Definition
| Occurs when the signal from one pair of wires interferes with the signal on another pair of wires. |
|
|
Term
| NIC (network interface card) |
|
Definition
| Provides the communication channel between your computer's motherboard and the network. |
|
|
Term
|
Definition
| A device on a network with an address that can be accessed to send or receive information. |
|
|
Term
|
Definition
| A challenge-response protocol that's used with operating systems running Windows NT 4.0 or earlier. |
|
|
Term
| NTP (Network Time Protocol) |
|
Definition
| An OSI Application layer protocol that provides the mechanisms to synchronize time and coordinate time distribution in a large, diverse internet operating at rates from mundane to light wave. |
|
|
Term
| one-factor authentication |
|
Definition
| Use of a single type of authentication; typically something you know. |
|
|
Term
| OSI (Open Systems Interconnection) model |
|
Definition
| A standard means of describing a network operating system by defining it as a series of layers, each with specific input and output. |
|
|
Term
| OTDR (optical time-domain reflectometer) |
|
Definition
| Version of TDR for optical cable. |
|
|
Term
|
Definition
| Data is broken up into packets before it's sent over the network; each packet is transmitted individually and is able to follow different routes to its destination. |
|
|
Term
| PAP (Password Authentication Protocol) |
|
Definition
| An insecure authentication method used by the Point to Point Protocol (PPP) for remote dial-up access. |
|
|
Term
|
Definition
| Applications you use (or attackers use) to attempt to determine or decipher the passwords associated with user accounts. |
|
|
Term
| PAT (Port Address Translation) |
|
Definition
| Translates TCP or UDP communications made between hosts on a private network and hosts on a public network, allowing a single public IP address to be used by many hosts on a private network. |
|
|
Term
|
Definition
| Temporary or quick fix designed to fix a security vulnerability, compatibility or operating issue. |
|
|
Term
|
Definition
| Consists of several client computers that are connected to a network for simple file and printer sharing in a small office or home office. |
|
|
Term
|
Definition
| An attack where an e-mail that appears to be from a trusted sender directs the recipient to a Web site that looks like the company's site they are impersonating and then records the user's logon information. |
|
|
Term
|
Definition
| A material object, such as a smart card, that stores a cryptographic key, which might be a digital signature or biometric data. |
|
|
Term
| PKI (public key infrastructure) |
|
Definition
| A formalized and feature rich system for sharing public keys, distributing certificates, and verifying the integrity and authenticity of these components and their issuers. |
|
|
Term
|
Definition
| Original, unencrypted information. |
|
|
Term
|
Definition
| An enclosure in a building that's used to move air for heating, cooling, or humidity control. |
|
|
Term
| PoE (Power over Ethernet) |
|
Definition
| A method for transferring both electrical power and data to remote devices over twisted-pair cable in an Ethernet network. |
|
|
Term
| point-to-point connection |
|
Definition
| There's a dedicated connection between two nodes—only those two nodes communicate over the connection. |
|
|
Term
| POP3 (Post Office Protocol version 3) |
|
Definition
| An OSI Application layer e-mail protocol used to download and delete messages from the mail server. |
|
|
Term
|
Definition
| A number between 0 and 65,535 that identifies a program running on a computer. |
|
|
Term
|
Definition
| A tool that examines a host or network to determine which ports are being monitored by applications on the scanned hosts. |
|
|
Term
| POTS (plain old telephone service) |
|
Definition
| The network of the world's public circuit-switched telephone networks (public switched telephone network—PSTN). |
|
|
Term
|
Definition
| A lock that's opened or closed with a metal key, or by turning or pressing a button in the center. |
|
|
Term
|
Definition
| A language that computers, servers, and network devices use to communicate with each other. |
|
|
Term
|
Definition
| A server that acts as an intermediary between computers on a network and the Internet. |
|
|
Term
|
Definition
| Used to terminate station cables and cross-connect to other punchdown locations. There are two types— the 110 block and the older 66M block. |
|
|
Term
|
Definition
| A wireless technology that use signals sent over electromagnetic radio waves to transmit data between devices, allowing transmissions to pass through most nonmetallic obstructions and around corners. |
|
|
Term
| RADIUS (Remote Access Dial-in User Service) |
|
Definition
| Uses a specialized server for authentication and WEP for data encryption. |
|
|
Term
| RARP (Reverse Address Resolution Protocol) |
|
Definition
| Converts physical MAC addresses to logical IP addresses. |
|
|
Term
|
Definition
| A defined namespace in RADIUS, which helps determine which server should be used to authenticate a connection request. |
|
|
Term
|
Definition
| A basic internetworking device which boosts the electronic signal from one network cable segment or wireless LAN and passes it to another; helping you to physically extend network segments or wireless coverage. |
|
|
Term
|
Definition
| Coaxial cable used to deliver cable television signals to and within homes. |
|
|
Term
|
Definition
| 50-ohm stranded core coaxial cables used for backbones. |
|
|
Term
|
Definition
| 75-ohm solid core cables with dual shielding (foil and braided wires) used for backbones. |
|
|
Term
|
Definition
| Coaxial cabling used for Ethernet networks. |
|
|
Term
|
Definition
| Coaxial cabling used for low-power video and RF signal connections. |
|
|
Term
|
Definition
| Each node is connected to a central device by two wires. |
|
|
Term
| RIP/RIP2 (Routing Information Protocol) |
|
Definition
| An OSI Network layer protocol responsible for defining how paths are chosen through the internetworking of one computer to another and how routers can share information about the networks of which they are aware. |
|
|
Term
|
Definition
| A TP cable where the wires in each end are the reverse of one another; used to connect a computer's serial port to the console port of a router or managed switch. |
|
|
Term
|
Definition
| A symmetric cipher in which characters are replaced with the character whose ASCII value is thirteen higher. |
|
|
Term
|
Definition
| An internetworking device that opens the MAC (Media Access Control) layer envelope and looks at the contents of the packet delivered at the MAC layer to make decisions on how to send data through the network. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| The best known asymmetric public key cipher where two users each generate a pair of keys: a private and public key pair. To send a secure message to the second user, the first user obtains the second user's public key and encrypts the message with it. Only second user's private key can be used to decrypt the message. |
|
|
Term
|
Definition
| WAN connection technology that uses connections made by sending and receiving signals from satellites in orbit around the earth. |
|
|
Term
|
Definition
| A router used to filter all traffic to the private intranet but also to allow full access to the computer in the DMZ. |
|
|
Term
|
Definition
| Defines rules and practices that the organization puts in place to manage and protect information within the organization. |
|
|
Term
|
Definition
| The portion of the network on either side of two network transmission devices. |
|
|
Term
|
Definition
| A collection of updates as a single installation. |
|
|
Term
|
Definition
| An OSI Application layer protocol used to secure Internet transmissions by securing the individual data packets themselves. |
|
|
Term
| signal-regenerating repeater |
|
Definition
| A repeater that reads the signal and then creates an exact duplicate of the original signal before sending it on. Also called an intelligent repeater. |
|
|
Term
|
Definition
| Data is transmitted across the medium in a single direction. |
|
|
Term
|
Definition
| Optic fibers which support only a single transmission path. |
|
|
Term
|
Definition
| A user logs on once to gain access to multiple systems without being required to log on each time another system is accessed. |
|
|
Term
|
Definition
| An IPv6 private address; begin with FE with C to F for the third hex digit. |
|
|
Term
|
Definition
| Links the networks at two locations via the Internet. |
|
|
Term
| SLA (service-level agreement) |
|
Definition
| A contract documenting the service level between a service provider and the end user. |
|
|
Term
| SMTP (Simple Mail Transfer Protocol) |
|
Definition
| An OSI Application layer e-mail protocol used to send and receive e-mail messages between e-mail servers; and send e-mail from an e-mail client to an e-mail server. |
|
|
Term
|
Definition
| An attack where a host is flooded with ICMP packets. |
|
|
Term
| SNAT (source network address translation) |
|
Definition
| The process that a router or firewall uses to rewrite source and destination addresses of IP packets as they pass through. |
|
|
Term
|
Definition
| An attack which exploits trust in the real world between people to gain information that attackers can then use to gain access to computer systems. |
|
|
Term
| SONET (Synchronous Optical NETwork) |
|
Definition
| An ANSI standard protocol for signal transmission on optical networks, which is divided into categories based on a base signal (Synchronous Transport Signal or STS) and an optical carrier (OC) level. |
|
|
Term
|
Definition
| An attack where a user appears to be a different user that is sending messages. Also, presenting credentials that don't belong to you in order to gain access to a system. |
|
|
Term
|
Definition
| Software that gets installed on a system without the user's knowledge and gathers personal or other sensitive information; potentially changing the computer's configuration. |
|
|
Term
|
Definition
| A popular tool for remote command-line system access and management, with current implementations supporting secure file transport (over Secure FTP, or SFTP). |
|
|
Term
|
Definition
| A popular tool for remote command-line system access and management, with current implementations supporting secure file transport (over Secure FTP, or SFTP). |
|
|
Term
| SSL (Secure Sockets Layer) |
|
Definition
| An OSI Application layer public-key/private-key encryption protocol used to transmit data securely over the Internet over TCP/IP. |
|
|
Term
|
Definition
| Each node is connected to a central network transmission device such as a hub or a switch, which serves as a distribution device. |
|
|
Term
|
Definition
| A TP cable where both ends follow either 568A or 568B wiring standard. |
|
|
Term
|
Definition
| Used to identify the network ID and host ID portions of an IP address. |
|
|
Term
|
Definition
| Creating one large network from several smaller ones by taking bits from the network ID and giving them to the host ID. |
|
|
Term
|
Definition
| Uses the same key to encrypt and decrypt a piece of data. |
|
|
Term
|
Definition
| An attack where a server is inundated with half open TCP connections which prevent valid users from being able to access the server. |
|
|
Term
|
Definition
| A leased digital communications line provided through a common carrier; the leased lines are permanent connections that use multiplexing, a process of dividing a single channel into multiple channels that can be used to carry voice, data, video, or other signals. Several variations of T-carrier lines are available; the most popular are T1 and T3 lines. |
|
|
Term
| TACACS+ (Terminal Access Controller Access Control System) |
|
Definition
| A proprietary authentication protocol developed by Cisco Systems that provides centralized and scalable authentication, along with authorization and accounting functions. |
|
|
Term
| TCP (Transmission Control Protocol) |
|
Definition
| An OSI Transport layer protocol used to transmit information across the Internet, providing acknowledged, connection-oriented communications, as well as guaranteed delivery, proper sequencing, and data integrity checks. |
|
|
Term
| TCP/IP (Transmission Control Protocol/Internet Protocol) |
|
Definition
| A routable, non-proprietary protocol that's the protocol of the Internet, and the predominant Windows network protocol. |
|
|
Term
|
Definition
| A four-layer reference model is used to describe the TCP/IP protocol suite. |
|
|
Term
|
Definition
| An attacker takes over an established session between two nodes that are already communicating. |
|
|
Term
| TDR (time domain reflector) |
|
Definition
| A device used to verify impedance and termination in a cable. |
|
|
Term
|
Definition
| An OSI Application layer terminal emulation protocol that is primarily used to remotely connect to UNIX and Linux Systems. |
|
|
Term
| TFTP (Trivial File Transfer Protocol or Trivial FTP) |
|
Definition
| An OSI Application layer protocol used to send and receive files to a single computer or multiple computers simultaneously. |
|
|
Term
| three-factor authentication |
|
Definition
| Authentication based on three items; typically something you know, something you have, and something you are. |
|
|
Term
|
Definition
| The entry point to the DMZ requires three network cards—one network card is connected to the Internet, one to the DMZ network (or perimeter network), and the final network card to the intranet. Traffic is never allowed to flow directly from the Internet to the private intranet without filtering through the DMZ. |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Software that controls network traffic in order to optimize performance or increase usable bandwidth. Also called a bandwidth shaper. |
|
|
Term
|
Definition
| An application designed to appear harmless, but delivers malicious code to a computer. |
|
|
Term
|
Definition
| Composed of four pairs of copper wires, with the wires in each pair are twisted around each other, then twisted together and bundled within a covering. |
|
|
Term
| two-factor authentication |
|
Definition
| Authentication based on two items; typically something you know plus either "something you have" or "something you consist of." |
|
|
Term
| UDP (User Datagram Protocol) |
|
Definition
| An OSI Transport layer protocol used to provide connectionless, unacknowledged communications. |
|
|
Term
|
Definition
| Enhancement to the operating system and some of its features. |
|
|
Term
|
Definition
| The ability of a single network adapter in a switch to virtualize "n" number of network adapters. |
|
|
Term
|
Definition
| Used to make telephone calls over a data network such as the Internet. |
|
|
Term
| VPN (Virtual private network) |
|
Definition
| WAN connection technology that uses encryption and security protocols to create a private network over a public network. |
|
|
Term
|
Definition
| The process of marking buildings, curbs, and other landmarks indicating the presence of an available access point and its connection details by utilizing a set of symbols and shorthand. |
|
|
Term
|
Definition
| Driving around with a laptop system configured to listen for open wireless access points. |
|
|
Term
|
Definition
| Users are tricked into visiting a Web site that looks and acts like an official, legitimate Web site. The imposter Web site is set up to dupe the victim into providing information such as user names, passwords, credit card numbers, and other personal information. |
|
|
Term
| WEP (Wired Equivalent Privacy) |
|
Definition
| A wireless encryption technology which uses a 64-bit or 128-bit symmetric encryption cipher where a key is configured on both the WAP and the client. |
|
|
Term
| Wi-Fi (Wireless Fidelity) |
|
Definition
| The most widely used wireless technology at present; began as 802.11b IEEE standard, although most implementations have been upgraded to use the newer 802.11g. |
|
|
Term
|
Definition
| A hacker configures his or her computer to present itself as a wireless router to intercept a user's communication. |
|
|
Term
| WiMAX (IEEE 802.16 Air Interface Standard) |
|
Definition
| A point-to-multipoint broadband wireless access standard that's emerging as the wireless connection standard for long distances. |
|
|
Term
| Wireless Auto Configuration |
|
Definition
| Windows clients dynamically select the wireless network to which a connection |
|
|
Term
|
Definition
| Uses radio waves or infrared light instead of cables to connect network nodes. |
|
|
Term
|
Definition
| A horizontal cable run without splice points, cable junctures, or taps to an individual workstation. |
|
|
Term
|
Definition
| A program that replicates itself over the network without a user's intervention. |
|
|
Term
| WPA (Wi-Fi Protected Access) |
|
Definition
| A wireless encryption technology that uses the RC4 symmetric cipher with a 128-bit key. WPA Personal uses a "pre-shared key" (PSK), which simply means you must enter a passphrase onto both the AP and clients. |
|
|
Term
|
Definition
| Packet-switching communication protocol designed for long-distance analog data transmission rather than the circuit-switching technology used by the telephone system. |
|
|