General networkingΒΆ
- ACK (Acknowledgment Code)
A unique signal sent by a computer to show that it has successfully transmitted data
- API (Application Programming Interface)
A software component that allows applications to share data and functionality
- CIDR (Classless Inter-Domain Routing)
An IP addressing method that improves the efficiency of allocating IP addresses
- CLI (Command-line Interface)
A text-based interface for applications and operating systems that allows a user to enter commands and receive
- DNS (Domain Name System)
A system by which computers and other devices on the Internet or Internet protocol networks are uniquely identified using names matched to their IP addresses
- ICMP (Internet Control Message Protocol)
A protocol used for devices within the network to determine possible network issues
- IPFIX (Internet Protocol Flow Information Export)
A protocol intended to collect and analyze the of flow data from supported network devices
- LDAP (Lightweight Directory Access Protocol)
An open, cross-platform protocol used to access and maintain directory services for assets in an Internet protocol network
- MTTR (Mean Time to Resolution)
The the average amount of time between the detection and remediation of a security threat or incident
- NDR (Network Detection and Response)
A cybersecurity solution that use machine learning to detect cyber threats and aid remediation
- NTP (Network Time Protocol)
A networking protocol used to synchronize device clocks over the Internet
- NXDOMAIN (No Existing Domain)
An error message that means that a domain mentioned in the Domain Name System (DNS) query does not exist
- RADIUS (Remote Authentication Dial-In User Service)
A client-server AAA (authentication, authorization, accounting) protocol used to manage remote user access to a network
- SNMP (Simple Network Management Protocol)
An IP network protocol used to collect data related to state and/or behavior from devices on a network
- SSDP (Simple Service Discovery Protocol)
A network protocol used for advertising and discovering network services
- SSH (Secure Shell Protocol)
A network communication protocol that allows network services to be used securely over an unsecured network
- SYN scan
A port scanning technique that allows for the discovery of the status of a communications port without establishing a full connection
- Syslog
A cross-platform network logging protocol used to send and/or receive alerts between different devices on a network
- STIX (Structured Threat Information eXchange)
An industry-standard file format for the exchange of threat information between organizations and platforms
- TAXII (Trusted Automated eXchange of Indicator Information)
A protocol that allows the transmission of threat information, primarily in STIX format, between systems and organizations
- TACACS+ (Terminal Access Controller Access-Control System)
A protocol where the remote access server and the authentication server provide validation for users attempting to access the network
- TLS handshake
The process that starts secure communication between a client and a server
- TCP (Transmission Control Protocol)
A connection-oriented protocol that enables the bidirectional exchange of messages between devices on the same network
- UDP (User Datagram Protocol)
A communication protocol for transmitting messages between applications and programs in a network
- Virtual appliance
A pre-configured virtual machine image with pre-installed software that is meant to serve a specific function
- VPC (Virtual Private Cloud)
A secure and private cloud hosted in a public cloud
- VRF (Virtual Routing and Forwarding)
A technology that separates routing tables to isolate management traffic to the management interface