Professional terms in network security

Source: Internet
Author: User
Tags domain name server ftp protocol dns spoofing

Access Control List (ACL) Access Control List

Access token

Account lockout account Blocking

Account policies Accounting Policy

Accounts account

Adapter

Adaptive speed leveling adaptive speed level adjustment

Address Resolution Protocol (ARP) Address Resolution Protocol

Administrator account

ARPANET Apache (predecessor of the internet)

Algorithm

Alias

Allocation and positioning

Alias small Application

Allocation layer application layer

API Application Programming Interface

Anlpasswd is a proxy password checker similar to Passwd +.

Applications

ATM asynchronous transmission mode

Attack

Audio policy Audit policy

Auditing review and monitoring

Back-end backend

Borde Boundary

Borde gateway

Breakabie can break passwords

Breach attack and Violation

Cipher Password

Ciphertext

CAlass A domain A class domain

CAlass B domain B class domain

CAlass C domain C Class domain

Classless addressing classless Address Allocation

Cleartext plaintext

CSNW Netware Customer Service

Client customer, client

Client/server

Code

COM port comport (Communication port)

CIX service provider

Computer name

Crack intrusion

Cryptanalysis password Analysis

DLC Data Link Control

Decryption

Database

Dafault route default route

Dafault share default share

Denial of service

Dictionary attack

Directory

Directory replication

Domain

Domain controller domain name controller

Domain name
A domain name is actually the name of a computer that is connected to the Internet. Its function is as important as writing people's names and addresses in a mail. The domain name structure is as follows: Host Name of the computer. organization name. Network Name. top-level domain name. Domain names are expressed in text, which is easier to remember than IP addresses expressed in numbers. All levels of networks that join the Internet follow the naming rules of DNS to name the computers in the network, and are responsible for converting the domain name to IP address during communication.

DNS Server
DNS (Domain Name System) refers to the directory service System that queries the Domain Name or IP address on the Internet. When receiving a request, it can translate the domain name of another host into an IP address or vice versa. Most domain name systems maintain a large database that describes the ing between domain names and IP addresses, and the database is regularly updated. A translation request is usually sent from another computer on the network. It requires an IP address for route selection.

Dynamic DDE data exchange

DHCP Dynamic Host Configuration Protocol

Encryption

EGP external Gateway Protocol

FDDI Optical Fiber Distributed Data Interface

FAT file allocation table

File Transfer Protocol (FTP)

Filter

Firmware

Flooding

GSNW NetWare gateway service

GDI (graphical device interface) graphical device interface

GUI

HTML Hypertext Markup Language

HTTP Hypertext Transfer Protocol

IGP Internal Security

Internet Control Message Protocol (ICMP)
The TCP/IP protocol used to send control and error messages about IP datagram transmission. When an IP datagram cannot be transmitted
To the destination, it may be because the destination machine is suspended or the information traffic is blocked. The router may use ICMP
Notify the sender of the failure message.

IGMP (Internet Group Management Protocol, Internet Group Management Protocol)
This TCP/IP protocol allows Internet hosts to participate in multi-point broadcast (multicasting)-a type of broadcast to a computer group
Effective means of information

IIS Information Server

IP (Internet Protocol) Internet Protocol

IRC online chat

ISP network service provider

IPX Internet connection group protocol

IPC inter-process communication

IRQ interrupt request

IP address
An IP address is a 32-bit IP address assigned to the host. It consists of 4 bytes and is divided into dynamic
Static IP addresses. Dynamic IP addresses refer to different addresses obtained by each connection, but static IP addresses
The status IP address is the same fixed address for each connection. Generally, the address obtained by dialing
All are dynamic, that is, the obtained address is different each time.

IP masquerade IP camouflage

IP spoofing

LAN

LPC local process call

NNTP Network News Transfer Protocol

PPP Point-to-Point Protocol
The Point-to-Point Protocol is a Protocol designed for users who cannot communicate with each other over a telephone line.

PDC Primary Domain Controller

Telnet Remote Login

TCP/IP Transmission Control Protocol/Internet Protocol
TCP/IP communication protocols mainly include the standards of network communication details on the Internet, as well as a set of network interconnection protocols and path selection algorithms. TCP is a transmission control protocol, which is equivalent to an item packing list to ensure that data is not lost during transmission. The IP address is an inter-network protocol, which is equivalent to the address and name of the recipient and ensures that the data arrives at the specified location.

TFTP Common File Transfer Protocol
TFTP is a simplified FTP protocol used by diskless computers to transmit information. It is very simple, so it can be solidified on the hard disk, and supports non-authentication operations. TFTP is a very insecure protocol.

Trojan Horse

Uniform URL Resource Locator

UDP User Datagram Protocol

VDM Virtual DOS host

UUCP is a cat-based file transfer protocol that has been used for a long time. Sometimes it is used to transmit Usenet news and E-mail over the Internet, especially on disconnected websites. Currently, few websites provide anonymous UUCP to access files. It is a File Transfer Protocol, which is used only by users who do not access the network and use the cat.

WWW
WWW (Word Wide Web) is the latest Internet Information Service. It is an interactive browsing and retrieval tool based on Hypertext files. You can use WWW to browse, transmit, and edit files in hypertext format on the Internet.

WAN

Virtual server

Usenet
Usenet is the main information source of the network news server. Usenet is a user communication network established by the masses, which uses the Internet to exchange information but is not completely dependent on the Internet for communication. Volunteers who use Usenet abide by some agreed network usage rules.

USER name

USER account

Web page

OpenGL open Graphics Language

ODBC Open Database Connection

PCI peripheral connection interface
.....................................................................

Authentication and authentication

Authorization

A Software Package for Back Office Microsoft

Back up backup

Backup browser

BDC backup Domain Controller

Baseline

BIOS Basic Input/Output System

Binding Association and collection

Bit and binary bit

BOOTP Boot Protocol

BGP guiding Gateway Protocol

Bottleneck bottle diameter

Bridge and bridge

Browser

Browses browsing

Channel channels and channels

CSU/DSU channel service unit/digital service unit

Checksum

Cluster clusters and clusters

CGI public Gateway Interface
CGI (Common Gateway Interface) is a program that can produce the same results or the results change with user input. It can be written in an explanatory interface language or a compilation programming language. CGI specifies the interface protocol standard for the Web server to call other executable programs. The Web server calls the CGI program to implement interaction with the Web browser, that is, the CGI program receives and processes the information sent to the Web server by the Web browser, then, the response is sent back to the Web server and Web browser. CGI programs generally process form data on Web pages, query databases, and integrate with traditional application systems. Although CGI programs can be written in any programming language, CGI programs written in C language have the features of fast execution speed and high security.

CGI-based attack (CGI-based attack), which uses the vulnerabilities of public gateway interfaces to attack, usually through www sites.

The crash (crash) system suddenly becomes invalid and requires a new boot.

CD-ROM read-only Disc

Component

Data link

Datasync datagram

Default document

Digital key system digital keying system

Disk mirroring

Distributed file system

Data-driven attack (data-driven attacks) relies on attacks that hide or encapsulate data, and the data is not noticed through the firewall.

DNS spoofing (Domain Name Server electronic spoofing) attackers use to damage the Domain Name Server, a method that can be achieved by spoofing the DNS's high-speed cache or internal attacks (generally, attackers pretend to be legitimate DNS server roles)

DoS (hey, it's not DOS, it's deniad of service, it's a massive Denial of service) when a user maliciously uses the network information server, it will refuse to provide services to legitimate users.

Eavesdropping and theft

Encrypted tunnel encryption Channel

Enterprise network

Ethernet

External security

Environment variable

Fax modem

File attribute

File system

File

Form Format

Fragments Segmentation

Frame relay slave relay

Firewall
Firework (firewall) is one or more systems that enhance security protection between the Internet and Intranetp (Intranet. The firewall can determine which internal services are allowed

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.