Create
Learn
Share

Network Security

rename
verickle's version from 2016-07-12 11:06

Glossary

Question Answer
6to4 PrefixA technique that enables IPv6 hosts to communicate over the IPv4 Internet
Access Control Lists (ACLs)A basic form of firewall protection
AESAdvanced Encryption Standard
AHAuthentication Header
Brute Force AttackAttacker uses every possible combination of characters for the password.
Buffer OverflowHappens when a program tries to put more data into a buffer than it was configured to hold
CHAPChallenge Handshake Authentication Protocol
Denial of Service (DoS)A service is being denied to a computer, network, or server.
DES, 3DESData Encryption Standard, Triple Data Encryption Standard
Dictionary AttackUses known passwords and many variations (upper- and lowercase and combinations) to try to log in to your account
Diffie-HellmanKey generation algorithm
Directed BroadcastThe broadcast is sent to a specific subnet.
DNSDomain name service
EAPExtensible Authentication Protocol
ESPEncapsulating Security Protocol
FirewallUsed in computer networks for protecting the network
Full IPv6 AddressAll 32 hexadecimal positions contain a value other than 0.
GREGeneric Routing Encapsulation
IKEInternet Key Exchange
IP TunnelAn IP packet encapsulated in another IP packet
IPsecIP security is used to encrypt data between various networking devices
ISAKMPInternet Security Association and Key Management Protocol
L2FLayer 2 Forwarding
L2TPLayer 2 Tunneling Protocol
MalwareMalicious programs
MD5Message Digest 5
netstat -a -b(a) Command used to display the ports currently open on a Windows operating system and (b) used to display the executable involved in creating the connection or listening port
Packet FilteringA limit is placed on the information that can enter the network.
Packet SniffingA technique in which the contents of data packets are watched
PAPPassword Authentication Protocol
PPPPoint-to-Point Protocol
PPTPPoint to Point Tunneling Protocol
Proxy ServerClients go through a proxy to communicate with secure systems.
SHA-1Secure Hash Algorithm
Social EngineeringA way for an intruder to obtain enough information from people to gain access to the network
SpoofInserting a different IP address in place of an IP packet's source address to make it appear that the packet came from another network
Stateful FirewallKeeps track of the data packet flow
SYNSynchronizing packet
TCPTransmission Control Protocol
Transport Layer ProtocolsDefine the type of connection established between hosts and how acknowledgements are sent
UDPUser Datagram Protocol
VirusA piece of malicious computer code that, when opened, can damage your hardware, software, or other files
WormA type of virus that attacks computers, typically proliferates by itself, and can deny service to networks
memorize