Term
|
Definition
| Value of an SNMP management information base (MIB) object. That value can be read with a Get PDU or changed with a Set PDU. |
|
|
Term
| variable-length subnet masking (VLSM) |
|
Definition
| The basis of allocating and routing classless addresses, not restricting subnet masks to /8, /16, or /24, which classful addressing did. Based on variable-length subnet masking (VLSM), where subnets can be allocated according to the needs of an organization, such as /26 for a network with 254 or fewer node, or /30 for a network with only two nodes. |
|
|
Term
|
Definition
| Main patch panel in a telecommunications room. |
|
|
Term
| very-high-bit-rate DSL (VDSL) |
|
Definition
| The latest form of DSL with download and upload speeds of up to 100 Mbps. VDSL was designed to run on copper phone lines, but many VDSL suppliers use fiber-optic cabling to increase effective distances. |
|
|
Term
|
Definition
| Security measures that use remotely monitored visual systems that include IP cameras and closed-circuit televisions (CCTVs). |
|
|
Term
| video teleconferencing (VTC) |
|
Definition
| The classic, multicast-based presentation where one presenter pushes out a stream of video to any number of properly configured and properly authorized multicast clients. |
|
|
Term
| virtual desktop infrastructure (VDI) |
|
Definition
| Technologies that use virtual machines to provide and manage virtual desktops. VDI can provide benefits like flexible management when the desktop VMs are centralized on a smaller number of servers. |
|
|
Term
|
Definition
| Block-level storage provided via a storage area network (SAN) that functions for the client computer as a physical, directly attached hard drive. |
|
|
Term
|
Definition
| A firewall that is implemented in software within a virtual machine in cases where it would be difficult, costly, or impossible to install a traditional physical firewall. |
|
|
Term
|
Definition
| A single IP address shared by multiple systems. This is commonly the single IP address assigned to a home or organization that uses NAT to have multiple IP stations on the private side of the NAT router. Virtual IP addresses are also used by First Hop Redundancy Protocol (FHRP). |
|
|
Term
| virtual local area network (VLAN) |
|
Definition
| A common feature among managed switches that enables a single switch to support multiple Layer 2 broadcast domains and provide isolation between hosts on different VLANs. Critical for modern network performance and security. |
|
|
Term
|
Definition
| A virtual computer accessed through a class of programs called a hypervisor or virtual machine monitor. A virtual machine runs inside your actual operating system, essentially enabling you to run two or more operating systems at once. |
|
|
Term
| virtual machine monitor (VMM) |
|
Definition
| In virtualization, a layer of programming that creates, supports, and manages a virtual machine. |
|
|
Term
| Virtual Network Computing (VNC) |
|
Definition
| A remote access program and protocol. |
|
|
Term
| virtual network interface card (vNIC) |
|
Definition
| Software-based NIC that functions identically to a physical NIC and uses a software connection to pass traffic from the real NIC to the virtual one. |
|
|
Term
|
Definition
| Software that functionally replaces a physical PBX telephone system. |
|
|
Term
| virtual private network (VPN) |
|
Definition
| A network configuration that enables a remote user to access a private network via the Internet. VPNs employ an encryption methodology called tunneling, which protects the data from interception. |
|
|
Term
|
Definition
| A router that is implemented in software within a virtual machine. The scalability of a virtual machine makes it easy to add capacity to the router when it is needed. Virtual routers are easily managed and are highly scalable without requiring the purchase of additional network hardware. |
|
|
Term
| Virtual Router Redundancy Protocol (VRRP) |
|
Definition
| Open standard FHRP that provides high availability by taking multiple routers and grouping them together into a single virtual router with a single virtual IP address that clients use as a default gateway. See First Hop Redundancy Protocol (FHRP). |
|
|
Term
|
Definition
| Software that performs Layer 2 switching within a hypervisor and enables virtual machines (VMs) to communicate with each other without going outside of the host system. |
|
|
Term
|
Definition
| Generally, the process of running software (called a hypervisor) on a host computer to create a virtual machine (VM) that models (virtualizes) the hardware you’d find on a physical computer. Also, a pattern that involves replacing existing components with software (virtual) versions that are roughly indistinguishable to any programs, devices, or users that interact with them. |
|
|
Term
| virtualized network functions (VNFs) |
|
Definition
| Network functions such as firewalls, load balancers, and routers that are run using network function virtualization infrastructure (NFVI). |
|
|
Term
| virtualized network function components (VNFCs) |
|
Definition
| Virtual machines (or containers) that can be interconnected to work collectively as a VNF, such as a VPN concentrator or firewall. |
|
|
Term
|
Definition
| A program that can make a copy of itself on a system without the user being aware of it. All viruses carry some payload that may or may not do something malicious. Computer viruses generally require a host file or program to run. |
|
|
Term
| virus definition or data files |
|
Definition
| Enables the virus protection software to recognize the viruses on your system and clean them. These files should be updated often. Also called signature files, depending on the virus protection software in use. |
|
|
Term
|
Definition
| Anti-malware program that passively monitors a computer’s activity, checking for viruses only when certain events occur, such as a program executing or a file being downloaded. |
|
|
Term
|
Definition
| A Layer 2 attack that enables an attacker to access hosts on a VLAN the attacker is not a part of. Traditionally this attack used switch spoofing or double tagging. |
|
|
Term
|
Definition
| A method to load-balance wireless network clients associated with a single SSID. Distributes clients across many VLANs to avoid excessive levels of broadcast traffic. |
|
|
Term
| VLAN Trunking Protocol (VTP) |
|
Definition
| Cisco proprietary protocol to automate the process of syncing VLANs across switches. |
|
|
Term
|
Definition
| Using an IP network to conduct voice calls. |
|
|
Term
|
Definition
| Interface between a traditional switched telephone network and a VoIP service provider. |
|
|
Term
|
Definition
| A private branch exchange that uses VoIP instead of the traditional switched telephone circuits. |
|
|
Term
|
Definition
| Unit of measurement for voltage. |
|
|
Term
|
Definition
| The pressure of the electrons passing through a wire. |
|
|
Term
|
Definition
| Tracks voltage over time by plugging into a power outlet. Also known as a voltage quality recorder |
|
|
Term
|
Definition
| A server program that supports many VPN connections (L2TP, SSL VPN, etc.). Typically part of a VPN-capable router. |
|
|
Term
|
Definition
| A connection over the Internet between a client and a server; the VPN tunnel enables the client to access remote resources as if they were local, securely. |
|
|
Term
|
Definition
| A potential weakness in an infrastructure that a threat actor might exploit. |
|
|
Term
|
Definition
| The ongoing process of identifying vulnerabilities and dealing with them. |
|
|
Term
|
Definition
| A tool that scans a network for potential attack vectors. |
|
|
Term
|
Definition
| A geographically dispersed network created by linking various computers and LANs over long distances, generally using leased phone lines. There is no firm dividing line between a WAN and a LAN. |
|
|
Term
|
Definition
| Facility with all of the physical resources, computers, and network infrastructure to recover from a primary site disaster. A warm site does not have current backup data and it may take a day or more to recover and install backups before business operations can recommence. |
|
|
Term
|
Definition
| The amount of amps and volts needed by a particular device to function. |
|
|
Term
|
Definition
| In the context of laser pulses, the distance the signal has to travel before it completes its cyclical oscillation and starts to repeat. Measured in nanometers, wavelength can be loosely associated with colors. |
|
|
Term
|
Definition
| A server that speaks the HTTP protocol, often secured with TLS. Historically used to deliver only HTML Web sites, has since became the backbone for almost all network-based apps. |
|
|
Term
|
Definition
| Applications and processes that can be accessed over a network, rather than being accessed locally on the client machine. Web services include things such as Web-based e-mail, network-shareable documents, spreadsheets and databases, and many other types of cloud-based applications. |
|
|
Term
|
Definition
| Port numbers from 0 to 1023 that are used primarily by client applications to talk to server applications in TCP/IP networks. |
|
|
Term
|
Definition
| A geographically dispersed network created by linking various computers and LANs over long distances, generally using leased phone lines. There is no firm dividing line between a WAN and a LAN. |
|
|
Term
|
Definition
| An 802.11 standard (marketed as Wi-Fi 4) that increases transfer speeds and adds support for multiple input/multiple output (MIMO) by using multiple antennas. 802.11n can operate on either the 2.4- or 5-GHz frequency band and has a maximum throughput of 400 Mbps. Superseded by 802.11ac, but used with many IoT devices. |
|
|
Term
|
Definition
| A wireless standard that operates in the frequency range of 5 GHz and offers throughput of up to 1 Gbps. 802.11ac is marketed as Wi-Fi 5. |
|
|
Term
|
Definition
| Wireless standard that brings improvements in high-density areas such as stadiums and conferences in comparison to previous standards. Marketed as both Wi-Fi 6 and Wi-Fi 6E. Wi-Fi 6 operates at the 2.4-GHz and 5-GHz bands, while Wi-Fi 6E operates at the 6-GHz band. 802.11ax offers a maximum throughput of up to 10 Gbps. |
|
|
Term
|
Definition
| The most widely adopted wireless networking type in use today. Technically, only wireless devices that conform to the extended versions of the 802.11 standard—802.11a, b, g, n, ac, and ax—are Wi-Fi certified. |
|
|
Term
|
Definition
| Any device that finds and documents all wireless networks in the area. |
|
|
Term
| Wi-Fi Protected Access (WPA) |
|
Definition
| A wireless security protocol that addresses weaknesses and acts as an upgrade to WEP. WPA offers security enhancements such as dynamic encryption key generation (keys are issued on a per-user and per-session basis), an encryption key integrity-checking feature, user authentication through the industry-standard Extensible Authentication Protocol (EAP), and other advanced features that WEP lacks. WPA has been replaced by the more secure WPA2. |
|
|
Term
| Wi-Fi Protected Access 2 (WPA2) |
|
Definition
| Consumer name for the IEEE 802.11i standard and the replacement for the WPA protocol. It uses the Advanced Encryption Standard algorithm, making it much harder to crack than its predecessor. |
|
|
Term
| Wi-Fi Protected Access 3 (WPA3) |
|
Definition
| Wireless encryption standard that is replacing WPA2. Uses Simultaneous Authentication of Equals (SAE), a key exchange based on Diffie-Hellman that generates unique encryption keys between each client and WAP. |
|
|
Term
| Wi-Fi Protected Setup (WPS) |
|
Definition
| Automated and semi-automated process to connect a wireless device to a WAP. The process can be as simple as pressing a button on the device or pressing the button and then entering a PIN code. WPS is particularly vulnerable to brute force attacks. |
|
|
Term
| Windows Defender Firewall |
|
Definition
| The firewall that has been included in Windows operating systems since Windows XP SP2; originally named Internet Connection Firewall (ICF) but renamed in subsequent versions of Windows. |
|
|
Term
|
Definition
| A group of computers controlled by a computer running a Windows Server operating system with the Active Directory Domain Controller role installed. |
|
|
Term
|
Definition
| A test for copper cables that checks not only for continuity but also that all the wires on both ends of the cable connect to the right spot. A wire map will also pick up shorts and crossed wires. |
|
|
Term
|
Definition
| A document that usually consists of multiple pages and that shows the following: how the wires in a network connect to switches and other nodes, what types of cables are used, and how patch panels are configured. It usually includes details about each cable run. |
|
|
Term
|
Definition
| In a basic structured cabling network, often simply an office or cubicle that potentially contains a PC attached to the network. |
|
|
Term
|
Definition
| A convenient method of organizing computers under Network/My Network Places in Windows operating systems. |
|
|
Term
|
Definition
| Computer that a person physically uses to accomplish their work. Often a general computer, but workstations for some occupations need specialized hardware. Traditionally, workstations were stationary computers that were small and cheap enough for it to be practical to set one up at an employee’s physical workstation (in contrast to shared mini/mainframe computers that took up one or more server racks). |
|
|
Term
|
Definition
| A form of malware. Unlike a classic virus, a worm does not infect other files on the computer. Instead, it autonomously replicates by infecting systems over a network by taking advantage of security weaknesses in networking protocols. |
|
|
Term
|
Definition
| A wireless security protocol that addresses weaknesses and acts as an upgrade to WEP. WPA offers security enhancements such as dynamic encryption key generation (keys are issued on a per-user and per-session basis), an encryption key integrity-checking feature, user authentication through the industry-standard Extensible Authentication Protocol (EAP), and other advanced features that WEP lacks. WPA has been replaced by the more secure WPA2. |
|
|
Term
|
Definition
| Consumer name for the IEEE 802.11i standard and the replacement for the WPA protocol. It uses the Advanced Encryption Standard algorithm, making it much harder to crack than its predecessor. |
|
|
Term
|
Definition
| A version of WPA2 that uses a RADIUS server for authentication. |
|
|
Term
|
Definition
| Wireless encryption standard that is replacing WPA2. Uses Simultaneous Authentication of Equals (SAE), a key exchange based on Diffie-Hellman that generates unique encryption keys between each client and WAP. |
|
|
Term
|
Definition
| Automated and semi-automated process to connect a wireless device to a WAP. The process can be as simple as pressing a button on the device or pressing the button and then entering a PIN code. WPS is particularly vulnerable to brute force attacks. |
|
|
Term
|
Definition
| A vast network of servers and clients communicating through the Hypertext Transfer Protocol (HTTP). Commonly accessed using graphical Web-browsing software such as Mozilla Firefox and Google Chrome. |
|
|
Term
|
Definition
| An operation commonly used in cryptography. XOR takes two input bits and outputs one bit. If the input bits are the same, the output is 0, while if they are different, the output is 1. |
|
|
Term
|
Definition
| Cable used to interface with a Cisco device. |
|
|
Term
| zero-configuration networking (zeroconf) |
|
Definition
| Automatically generated IP addresses in the 168.254.0.0/16 subnet when a DHCP server is unreachable. |
|
|
Term
|
Definition
| New attack that exploits a vulnerability that has yet to be identified. |
|
|
Term
|
Definition
| A cybersecurity paradigm focused on resource protection and the premise that trust is never granted implicitly but must be continually evaluated. |
|
|
Term
|
Definition
| Wireless home automation control standard. |
|
|
Term
|
Definition
| A single computer under the control of an operator that is used in a botnet attack. |
|
|
Term
|
Definition
| Wireless home automation control standard. |
|
|