Term
| Serve as a gateway between a trusted and untrusted network that gives limited, authorized access to untrusted hosts. |
|
Definition
|
|
Term
| Layer 2 devices that filter traffic between segments based on Media Access Control (MAC) addresses. |
|
Definition
|
|
Term
| Sublayer that provides services for the application layer and request services from the session layer |
|
Definition
| Common application service element (CASE) |
|
|
Term
| Multiplex connected devices into one signal to be transmitted on a network |
|
Definition
|
|
Term
| A wireless technology that spreads a transmission over a much larger frequency band, and with corresponding smaller amplitude |
|
Definition
| Direct-Sequence Spread Spectrum (DSSS) |
|
|
Term
| The process of transforming encrypted data back into its original form, so it can be understood. |
|
Definition
|
|
Term
| A lightweight encapsulation protocol and lacks the reliable data transport of the TCP layer |
|
Definition
| Fibre Channel over Ethernet (FCoE) |
|
|
Term
| A stateful protocol that requires two communication channels |
|
Definition
| File Transfer Protocol (FTP) |
|
|
Term
| Devices that enforce administrative security policies by filtering incoming traffic based on a set of rules |
|
Definition
|
|
Term
| This wireless technology spreads its signal over rapidly changing frequencies |
|
Definition
| Frequency-Hopping Spread Spectrum (FHSS) |
|
|
Term
| Provides a means to send error messages for non-transient error conditions and provides a way to probe the network in order to determine general characteristics about the network. |
|
Definition
| Internet Control Message Protocol (ICMP) |
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
|
|
Term
| A client/server-based directory query protocol loosely based upon X.500, commonly used for managing user information |
|
Definition
| Lightweight Directory Access Protocol (LDAP) |
|
|
Term
| Allow users remote access to a network via analog phone lines |
|
Definition
|
|
Term
| Layering model structured into seven layers (physical layer, data-link layer, network layer, transport layer, session layer, presentation layer, application layer) |
|
Definition
|
|
Term
| A basic network mapping technique that helps narrow the scope of an attack |
|
Definition
|
|
Term
| Involves a pair of keys-a public key and a private key-associated with an entity that needs to authenticate its identity electronically or to sign or encrypt data |
|
Definition
|
|
Term
| An authentication protocol used mainly in networked environments, such as ISPs, or for similar services requiring single sign-on for layer 3 network access, for scalable authentication combined with an acceptable degree of security. |
|
Definition
| Remote Authentication Dial-in User Service (RADIUS) |
|
|
Term
| Represent the ability to allow for the executing of objects across hosts |
|
Definition
| Remote Procedure Calls (RPC) |
|
|
Term
| A program which can extract data from output on a display intended for a human |
|
Definition
|
|
Term
| The first line of protection between trusted and untrusted networks |
|
Definition
|
|
Term
| Sublayer that provides application specific services (protocols) |
|
Definition
| Specific application service element (SASE) |
|
|
Term
| A method commonly used to modulate information into manageable bits that are sent over the air wirelessly |
|
Definition
|
|
Term
| Layering model structured into four layers (link layer, network layer, transport layer, application layer) |
|
Definition
| TCP/IP or Department of Defense (DoD) model |
|
|
Term
| A diagnostic tool that displays the path a packet traverses between a source and destination host |
|
Definition
|
|
Term
| Provides connection-oriented data management and reliable data transfer |
|
Definition
| Transmission Control Protocol (TCP) |
|
|
Term
| Provides a lightweight service for connectionless data transfer without error detection and correction |
|
Definition
| User Datagram Protocol (UDP) |
|
|
Term
| An encrypted tunnel between two hosts that allows them to securely communicate over an untrusted network |
|
Definition
| Virtual Private Network (VPN) |
|
|
Term
| A technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line |
|
Definition
| Voice over Internet Protocol (VoIP) |
|
|
Term
| Links two or more devices over a short distance using a wireless distribution method, usually providing a connection through an access point for Internet access. |
|
Definition
| Wireless local area network (WLAN) |
|
|
Term
| A wireless network made up of radio nodes organized in a mesh topology |
|
Definition
|
|
Term
| A type of wireless network that connects several wireless LANs |
|
Definition
| Wireless metropolitan area networks |
|
|
Term
| A type of wireless network that connects several wireless LANs |
|
Definition
| Wireless metropolitan area networks |
|
|
Term
| Interconnect devices within a relatively small area that is generally within a person's reach |
|
Definition
| Wireless personal area networks (WPANs) |
|
|