Term
|
Definition
| The term used by Cisco to refer to a variety of security tools that help prevent various attacks, including antivirus, anti-phishing, and anti-spam. |
|
|
Term
|
Definition
| The process by which a connection-oriented protocol creates a connection. With TCP, a connection is established by a three-way transmission of TCP segments. |
|
|
Term
|
Definition
|
|
Term
|
Definition
| A type of attack whose goal is to cause problems by preventing legitimate users from being able to access services, thereby preventing the normal operation of computers and networks. |
|
|
Term
|
Definition
| The process of discovering whether or not a data-link level frame was changed during transmission. This process typically uses a Frame Check Sequence (FCS) field in the data-link trailer. |
|
|
Term
|
Definition
| The process of noticing when some transmitted data was not successfully received and resending the data until it is successfully received. |
|
|
Term
|
Definition
| A device that forwards packets between the less secure and more secure parts of the network, applying rules that determine which packets are allowed to pass, and which are not. |
|
|
Term
|
Definition
| The process of regulating the amount of data sent by a sending computer toward a receiving computer. Several flow control mechanisms exist, including TCP flow control, which uses windowing. |
|
|
Term
|
Definition
| A process used by protocols that do error recovery in which the number that acknowledges data lists the next data that should be sent, not the last data that was successfully received. |
|
|
Term
|
Definition
| HTTP Hypertext Transfer Protocol |
|
|
Term
| Hypertext Transfer Protocol |
|
Definition
| The protocol used by web browsers and web servers to transfer files, such as text and graphic files. |
|
|
Term
|
Definition
| Intrusion Detection System |
|
|
Term
| Intrusion Detection System |
|
Definition
| A security function that examines more complex traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out, rating each perceived threat and reporting the threats. |
|
|
Term
|
Definition
| Intrusion Prevention System |
|
|
Term
| Intrusion Prevention System |
|
Definition
| A security function that examines more complex traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out, rating each perceived threat and reacting to prevent the more significant threats. |
|
|
Term
|
Definition
| A networking function, included in TCP, in which the protocol defines how the sending host should number the data transmitted, defines how the receiving device should attempt to reorder the data if it arrives out of order, and specifies to discard the data if it cannot be delivered in order. |
|
|
Term
|
Definition
| In TCP and UDP, a number that is used to uniquely identify the application process that either sent (source port) or should receive (destination port) data. In LAN switching, another term for switch interface. |
|
|
Term
|
Definition
| Positive Acknowledgment and Retransmission |
|
|
Term
| Positive Acknowledgment and Retransmission |
|
Definition
| A generic reference to how the error recovery feature works in many protocols, including TCP, in which the receiver must send an acknowledgment that either implies that the data was (positively) received, or send an acknowledgement that implies that some data was lost, so the sender can then resend the lost data. |
|
|
Term
|
Definition
1. In TCP, a term used to describe a TCP header and its encapsulated data (also called an L4PDU).
2. In TCP, the process of accepting a large chunk of data from the application layer and breaking it into smaller pieces that fit into TCP segments. |
|
|
Term
|
Definition
| For protocols such as TCP that allow the receiving device to dictate the amount of data the sender can send before receiving an acknowledgment—a concept called a window—a reference to the fact that the mechanism to grant future windows is typically just a number that grows upwards slowly after each acknowledgment, sliding upward. |
|
|
Term
|
Definition
| Universal Resource Locator |
|
|
Term
| Universal Resource Locator |
|
Definition
| A standard for how to refer to any piece of information retrievable via a TCP/IP network, most notably used to identify web pages. For example, http://www.cisco.com/univercd is a URL that identifies the protocol (HTTP), hostname (www.cisco.com), and web page (/univercd). |
|
|
Term
|
Definition
|
|
Term
|
Definition
| The process of securing communication between two devices whose packets pass over some public and unsecured network, typically the Internet. VPNs encrypt packets so that the communication is private and authenticate the identity of the endpoints. |
|
|
Term
|
Definition
| Voice over Internet Protocol |
|
|
Term
|
Definition
| The transport of voice traffic inside IP packets over an IP network. |
|
|
Term
|
Definition
| Software, running on some computer, that stores web pages and sends those web pages to web clients (web browsers) that request the web pages. |
|
|