General networkingΒΆ

ACK (Acknowledgment Code)

A unique signal sent by a computer to show that it has successfully transmitted data

API (Application Programming Interface)

A software component that allows applications to share data and functionality

CIDR (Classless Inter-Domain Routing)

An IP addressing method that improves the efficiency of allocating IP addresses

CLI (Command-line Interface)

A text-based interface for applications and operating systems that allows a user to enter commands and receive

DNS (Domain Name System)

A system by which computers and other devices on the Internet or Internet protocol networks are uniquely identified using names matched to their IP addresses

ICMP (Internet Control Message Protocol)

A protocol used for devices within the network to determine possible network issues

IPFIX (Internet Protocol Flow Information Export)

A protocol intended to collect and analyze the of flow data from supported network devices

LDAP (Lightweight Directory Access Protocol)

An open, cross-platform protocol used to access and maintain directory services for assets in an Internet protocol network

MTTR (Mean Time to Resolution)

The the average amount of time between the detection and remediation of a security threat or incident

NDR (Network Detection and Response)

A cybersecurity solution that use machine learning to detect cyber threats and aid remediation

NTP (Network Time Protocol)

A networking protocol used to synchronize device clocks over the Internet

NXDOMAIN (No Existing Domain)

An error message that means that a domain mentioned in the Domain Name System (DNS) query does not exist

RADIUS (Remote Authentication Dial-In User Service)

A client-server AAA (authentication, authorization, accounting) protocol used to manage remote user access to a network

SNMP (Simple Network Management Protocol)

An IP network protocol used to collect data related to state and/or behavior from devices on a network

SSDP (Simple Service Discovery Protocol)

A network protocol used for advertising and discovering network services

SSH (Secure Shell Protocol)

A network communication protocol that allows network services to be used securely over an unsecured network

SYN scan

A port scanning technique that allows for the discovery of the status of a communications port without establishing a full connection

Syslog

A cross-platform network logging protocol used to send and/or receive alerts between different devices on a network

STIX (Structured Threat Information eXchange)

An industry-standard file format for the exchange of threat information between organizations and platforms

TAXII (Trusted Automated eXchange of Indicator Information)

A protocol that allows the transmission of threat information, primarily in STIX format, between systems and organizations

TACACS+ (Terminal Access Controller Access-Control System)

A protocol where the remote access server and the authentication server provide validation for users attempting to access the network

TLS handshake

The process that starts secure communication between a client and a server

TCP (Transmission Control Protocol)

A connection-oriented protocol that enables the bidirectional exchange of messages between devices on the same network

UDP (User Datagram Protocol)

A communication protocol for transmitting messages between applications and programs in a network

Virtual appliance

A pre-configured virtual machine image with pre-installed software that is meant to serve a specific function

VPC (Virtual Private Cloud)

A secure and private cloud hosted in a public cloud

VRF (Virtual Routing and Forwarding)

A technology that separates routing tables to isolate management traffic to the management interface