Professional terms in network security

Source: Internet
Author: User
Tags imap domain name server file transfer protocol ftp protocol microsoft mail strong password dns spoofing

Access Control List (ACL) Access Control List
Access token
Account lockout account Blocking
Account policies Accounting Policy
Accounts account
Adapter
Adaptive speed leveling adaptive speed level adjustment
Address Resolution Protocol (ARP) Address Resolution Protocol
Administrator account
ARPANET Apache (predecessor of the internet)
Algorithm
Alias
Allocation and positioning
Alias small Application
Allocation layer application layer
API Application Programming Interface
Anlpasswd is a proxy password checker similar to Passwd +.
Applications
ATM asynchronous transmission mode
Attack
Audio policy Audit policy
Auditing review and monitoring
Back-end backend
Borde Boundary
Borde gateway
Breakabie can break passwords
Breach attack and Violation
Cipher Password
Ciphertext
CAlass A domain A class domain
CAlass B domain B class domain
CAlass C domain C Class domain
Classless addressing classless Address Allocation
Cleartext plaintext
CSNW Netware Customer Service
Client customer, client
Client/server
Code
COM port comport (Communication port)
CIX service provider
Computer name
Crack intrusion
Cryptanalysis password Analysis
DLC Data Link Control
Decryption
Database
Dafault route default route
Dafault share default share
Denial of service
Dictionary attack
Directory
Directory replication
Domain
Domain controller domain name controller
Domain name
A domain name is actually the name of a computer that is connected to the Internet. Its function is as important as writing people's names and addresses in a mail. The domain name structure is as follows: Host Name of the computer. organization name. Network Name. top-level domain name. Domain names are expressed in text, which is easier to remember than IP addresses expressed in numbers. All levels of networks that join the Internet follow the naming rules of DNS to name the computers in the network, and are responsible for converting the domain name to IP address during communication.
DNS Server
Domain Name System (DNS) is a directory service System that queries Domain names or IP addresses over the Internet. When receiving a request, it can translate the domain name of another host into an IP address or vice versa. Most domain name systems maintain a large database that describes the ing between domain names and IP addresses, and the database is regularly updated. A translation request is usually sent from another computer on the network. It requires an IP address for route selection.
Dynamic DDE data exchange
DHCP Dynamic Host Configuration Protocol
Encryption
EGP external Gateway Protocol
FDDI Optical Fiber Distributed Data Interface
FAT file allocation table
File Transfer Protocol (FTP)
Filter
Firmware
Flooding
GSNW NetWare gateway service
GDI (graphical device interface) graphical device interface
GUI
HTML Hypertext Markup Language
HTTP Hypertext Transfer Protocol
IGP Internal Security
Internet Control Message Protocol (ICMP)
The TCP/IP protocol used to send control and error messages about IP datagram transmission. When an IP datagram cannot be transmitted
To the destination, it may be because the destination machine is suspended or the information traffic is blocked. The router may use ICMP
Notify the sender of the failure message.
IGMP (Internet Group Management Protocol, Internet Group Management Protocol)
This TCP/IP protocol allows Internet hosts to participate in multi-point broadcast (multicasting)-a type of broadcast to a computer group
Effective means of information
IIS Information Server
IP (Internet Protocol) Internet Protocol
IRC online chat
ISP network service provider
IPX Internet connection group protocol
IPC inter-process communication
IRQ interrupt request
IP address
An IP address is a 32-bit IP address assigned to the host. It consists of 4 bytes and is divided into dynamic
Static IP addresses. Dynamic IP addresses refer to different addresses obtained by each connection, but static IP addresses
The status IP address is the same fixed address for each connection. Generally, the address obtained by dialing
All are dynamic, that is, the obtained address is different each time.
IP masquerade IP camouflage
IP spoofing
LAN
LPC local process call
NNTP Network News Transfer Protocol
PPP Point-to-Point Protocol
The Point-to-Point Protocol is a Protocol designed for users who cannot communicate with each other over a telephone line.
PDC Primary Domain Controller
Telnet Remote Login
TCP/IP Transmission Control Protocol/Internet Protocol
TCP/IP communication protocols mainly include the standards of network communication details on the Internet, as well as a set of network interconnection protocols and path selection algorithms. TCP is a transmission control protocol, which is equivalent to an item packing list to ensure that data is not lost during transmission. The IP address is an inter-network protocol, which is equivalent to the address and name of the recipient and ensures that the data arrives at the specified location.
TFTP Common File Transfer Protocol
TFTP is a simplified FTP protocol used by diskless computers to transmit information. It is very simple, so it can be solidified on the hard disk, and supports non-authentication operations. TFTP is a very insecure protocol.
Trojan Horse
Uniform URL Resource Locator
UDP User Datagram Protocol
VDM Virtual DOS host
UUCP is a cat-based file transfer protocol that has been used for a long time. Sometimes it is used to transmit Usenet news and E-mail over the Internet, especially on disconnected websites. Currently, few websites provide anonymous UUCP to access files. It is a File Transfer Protocol, which is used only by users who do not access the network and use the cat.
WWW
WWW (Word Wide Web) is the latest Internet Information Service. It is an interactive browsing and retrieval tool based on Hypertext files. You can use WWW to browse, transmit, and edit files in hypertext format on the Internet.
WAN
Virtual server
Usenet
Usenet is the main information source of the network news server. Usenet is a user communication network established by the masses, which uses the Internet to exchange information but is not completely dependent on the Internet for communication. Volunteers who use Usenet abide by some agreed network usage rules.
USER name
USER account
Web page
OpenGL open Graphics Language
ODBC Open Database Connection
PCI peripheral connection interface
.....................................................................
Authentication and authentication
Authorization
A Software Package for Back Office Microsoft
Back up backup
Backup browser
BDC backup Domain Controller
Baseline
BIOS Basic Input/Output System
Binding Association and collection
Bit and binary bit
BOOTP Boot Protocol
BGP guiding Gateway Protocol
Bottleneck bottle diameter
Bridge and bridge
Browser
Browses browsing
Channel channels and channels
CSU/DSU channel service unit/digital service unit
Checksum
Cluster clusters and clusters
CGI public Gateway Interface
CGI (Common Gateway Interface) is a program that can produce the same results or the results change with user input. It can be written in an explanatory interface language or a compilation programming language. CGI specifies the interface protocol standard for the Web server to call other executable programs. The Web server calls the CGI program to implement interaction with the Web browser, that is, the CGI program receives and processes the information sent to the Web server by the Web browser, then, the response is sent back to the Web server and Web browser. CGI programs generally process form data on Web pages, query databases, and integrate with traditional application systems. Although CGI programs can be written in any programming language, CGI programs written in C language have the features of fast execution speed and high security.
CGI-based attack (CGI-based attack), which uses the vulnerabilities of public gateway interfaces to attack, usually through www sites.
The crash (crash) system suddenly becomes invalid and requires a new boot.
CD-ROM read-only Disc
Component
Data link
Datasync datagram
Default document
Digital key system digital keying system
Disk mirroring
Distributed file system
Data-driven attack (data-driven attacks) relies on attacks that hide or encapsulate data, and the data is not noticed through the firewall.
DNS spoofing (Domain Name Server electronic spoofing) attackers use to damage the Domain Name Server, a method that can be achieved by spoofing the DNS's high-speed cache or internal attacks (generally, attackers pretend to be legitimate DNS server roles)
DoS (hey, it's not DOS, it's deniad of service, it's a massive Denial of service) when a user maliciously uses the network information server, it will refuse to provide services to legitimate users.
Eavesdropping and theft
Encrypted tunnel encryption Channel
Enterprise network
Ethernet
External security
Environment variable
Fax modem
File attribute
File system
File
Form Format
Fragments Segmentation
Frame relay slave relay
Firewall
Firework (firewall) is one or more systems that enhance security protection between the Internet and Intranetp (Intranet. The firewall can determine which internal services allow external access, which outsiders are permitted to access the internal services that are allowed, and which external services are accessible by internal personnel. To make the firewall effective, all information from and sent to the Internet must go through the firewall.
The firewall only allows authorization information to pass through, and the firewall itself cannot be infiltrated.
Gated daemon gated process (like an early UNIX path-finding Service)
Gateway
Global account
Global group
Group
Group account
Group identifier
HCL hardware compatibility table
Hash table
HPFS High-Performance File System
Home directory
Home page bamboo
Hop station and relay segment
Host
Hyperlink
The highjacking hijacking terminal allows an attacker to capture the control of another user session. This rarely happens. Once it occurs, it indicates that the security of the target has been damaged. In fact, NetXRay is doing well at this point.
HTPASSWD is a system that uses a password to protect websites on WWW (UNIX ).
Icon
Impersonation attack
Index server
ISA industrial standard structure
Inherieted Rights Filter inherits permission Filters
ISDN Integrated Service Digital Network
Interactive user
Intermediate system
Internal security
Internet Explorer (IE) IBM Web Browser
Internet server
Interpreter
Intranet, enterprise intranet
Intruder intrusion
IMAP is a mail protocol.
Internet Message Access Protocal. IMAP provides a way to manage emails on a remote server. It is similar to the POP protocol, but has more features than POP. features include: only download the mail title, create multiple mailboxes, and create a folder for saving mails on the server.
Java Virtual Machine
Javascript is a scripting language based on Java.
Jack in is a common hacker's spoken language, which means cracking server security.
Kernel
Keys key
Keyspace
Keystroke Recorder (Key Recorder) tools used to steal others' user names and passwords
LAN Server
Local security
Log * logs and records
Logging Logon
Logoff logout
Logical port
Logon Registration
Logon script
LFN long file name
Logic bomb (logical bomb) is a program or code that can cause a system lock or failure.
Mass browser main browser
MAPI
Is the abbreviation of Messaging Application Progrmming Interface. Microsoft and other companies have developed mapis to connect Windows applications to a variety of messaging systems from Microsoft Mail to Novell MHS. However, MAPI only works at the * regular working level, that is, the application that perceives mail. It can exchange mail and data on the network.
Member server
Menu
Message
Multilink multi-Link
MIME multimedia Internet Mail Extension
Multi-Protocol
Multiprocessing
Module
Multihomed host multi-point host
MUD
The full name of MUD is Multiple User Dimension, Multiple User Dialogue, or Multiple User Dungeon.
Named pipes named Pipe
NDS NetWare Directory Service
NetBEUI NetBIOS extension user interface
NetBIOS gateway
NetWare network operating system (Sorry, I forgot it was developed by that company)
Network
NetBIOS network Basic Input/Output System
NDIS Network Driver Interface Specification
NetDDE Dynamic Data Exchange
NIC network interface card
Network layer
Network Monitor a Network Monitor program
Network operating system
Network printer
Network security
Network user
NFS Network File System
Node
Npasswd UNIX is a proxy password Checker that filters potential passwords before being submitted to the password file.
OSPF Open Shortest Path Priority Protocol
OSI Model Open System Interconnection Mode
Out-of-band attack
Packet filter grouping filter
Password
Path
Payload
PBX vswitch
PCS Personal Communication Service
Peer
Permission
Plaintext
PPTP Point-to-Point Tunneling Protocol
Port
Prority priority
Protocol
Potential browser
POP Internet email protocol standard
Is the abbreviation of Post Office Protocol, which is the internet email Protocol standard. We can send and receive emails through a host with the POP service function. The disadvantage of this protocol is that when you receive emails, all emails are cleared from the server and downloaded to your local disk. Of course, there are also some client programs that can leave the email on the server, or set to files larger than a certain size cannot be downloaded. As emails use multimedia formats, they will become larger and larger. We hope to be able to flexibly understand what files to download and when to download them. This requires the IMAP protocol. The current POP version is POP3.
Process
Proxy
Proxy server
The proxy service is used by the Web user to obtain the data back. Generally, when the WWW software is used to connect a remote terminal to obtain the data, the request signal must be sent one byte at a time. With the proxy settings, the signal requiring data will be sent to the Proxy Server first. When the Proxy Server receives a user request, it first goes to the cache to find the same information. If yes, the Proxy Server directly sends the data to the user. If no information is available in the cache, the Proxy Server uses the bandwidth available on the network to retrieve data from the remote platform, store the data in the cache, and send the data to the user. Even if the line is blocked, it is faster than directly capturing it by the user.
Paseudorandom pseudo-random
Phreaking refers to the process of controlling the telephone system
RAS remote access service
Remote control
RPC Remote Procedure Call
Remote boot
Route
Router
Routing Route Selection
RIP route selection Information Protocol
Routed daemon is a UNIX path-finding service that uses RIP.
Routing table route table
R. U. P route update protocol
RSA is a public key encryption algorithm. RSA is perhaps the most popular.
Script
Search engine
SSL Secure Sockets Layer
Secure Password
SID Security Identifier
Sender
SLIP Serial Line Internet Protocol
Server
Server-based network
Session layer
Share and sharing
Share-level security shared-level security
SMTP Simple Mail Transfer Protocol
SNMP Simple Network Management Protocol
Site
SCSI small computer system interface
Snffer
Snooping
Standalone server independent server
Strong cipher Password
Stream cipher stream Password
Strong password
Structured SQL Query Language
Subnet mask
Subdirectory
Subnet
Swap file
SACL system access control table
S/Key secure connection is a one-time password system. In S/Key, passwords are never sent over the network, so they cannot be stolen.
The sniffer program secretly captures data packets passing through the network. Hackers generally use it to steal user names and passwords.
Spoofing (Electronic spoofing) Any process involving impersonating other users or hosts for unauthorized access to the target
Time bomb (time bomb) refers to a program that waits for a specific timer or event to be activated first, leading to machine failure.
TCPDUMP is a practical tool for capturing data packets in UNIX. It is often used to obtain detailed network communication records.
Traceroute is a common TCP program on UNIX. It is used to track routes between the local host and remote host.
T0, DS0 56 or 64 kbps
T1, DS1 24 PCM Digital calls, total rate of 1.544 Mbps
T3, DS3 28 T1 channels, works at 44.736 Mbps
Thin client
Thread
Throughput
Transport layer Transfer volume
Transport Protocol Transfer Protocol
Trust
Tunnel secure encryption Link
Vector of attack vector
Virtual directory
Virtual Machine (VM)
Virtual Reality Model language
Volume file set
Vulnerability
Weak passwurd Password
Well-known ports
Workstation
X.25 A Packet Exchange Network Protocol
Zone transfer Region Conversion

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.