Network security professional vocabulary

xiaoxiao2021-03-06  34

Access Control List (ACL) Access Control List

Access token Access token

Account Lockout account blockade

Account Policies Accounting Policy

Accounts account

Adapter adapter

Adaptive Speed ​​Leveling Adaptive Rate Level Adjustment

Address Resolution Protocol (ARP) address resolution protocol

Administrator Account Administrator account

Arpanet Apa.com (formerly in the Internet)

Algorithm algorithm

Alias ​​alias

Allocation assignment, positioning

Alias ​​applet

ALLOCATION LAYER application layer

API application programming interface

ANLPASSWD A proxy password checker with Passwd

Applications app

ATM asynchronous transmission mode

Attack attack

Audio Policy Trial Strategy

Auditing trial, monitoring

Back-end backend

Borde boundaries

Borde Gateway Boundary Gateway

Breakabie can be broken

BREACH breaks, violates

Cipher password

Ciphertext cps

Class A Domain Class A

Calass B Domain B

Calass C Domain C domain

Classless Addressing Uncocreciated Address Assignment

Cleartext

CSNW NetWare Customer Service

Client customers, clients

Client / Server Client / Server

CODE code

COM Port Com port (Communication port)

CIX service provider

Computer Name computer name

CRACK intrusion

CryptanAlysis password analysis

DLC data link control

Decryption decryption

Database database

Dafault Route default routing

DAFAULT Share

Denial of Service Denied Service

Dictionary Attack Dictionary Attack

Directory directory

Directory Replication Directory Copy

Domain domain

Domain Controller Domain Name Controller

Domain Name domain name

The domain name is actually the name of the network computer, and its role is like the letter needs to be written, the address is as heavy.

want. The domain name structure is as follows: Computer host name. Monkey name. Network name. Supreme layer domain name. Domain name expression, ratio

It is easy to remember with the IP address expressed in digital. Add to Internet-level networks in this network according to DNS naming rules

Computer naming and responsible for completing the conversion of the domain name to the IP address when the communication is completed.

DNS domain name server

DNS (Domain Name System, Domain Name System) refers to a directory service system that queries domain names or IP addresses on the Internet. When receiving the request, it translates the domain name of another host into an IP address, or vice versa. Most domain name

There is a large database, which describes the correspondence between the domain name and the IP address, and this database is

Regularly updated. The translation request usually comes from another computer on the network, which requires an IP address for routing.

DDE dynamic data exchange

DHCP Dynamic Host Configuration Protocol

ENCRYPTION encryption

EGP external gateway protocol

FDDI fiber distributed data interface

FAT file allocation table

FTP (File Transfer Protocol) file transfer protocol

Filter filter

FIRMware firmware

FLOODING drowned

GSNW NetWare Gateway Service

GRAPHICAL Device Interface graphics device interface

GUI graphical user interface

HTML hypertext markup language

HTTP hypertext transfer protocol IGP internal security

ICMP (Internet Control Message Protocol) internet control packet protocol

ICMP is used to send TCP / IP protocols for control and error messages for IP datagram transfer. When an IP datagram cannot be transmitted

When you go to your destination, it may be because of the destination machine suspension service or information traffic blocking, the router may use ICMP

Failure information notification sender.

IGMP (Internet Group Management Protocol, Internet Group Management Agreement)

This TCP / IP protocol allows Internet hosts to participate in multicasting --- a broadcast to computer group

Effective means of information

IIS information server

IP (Internet Protocol) internet protocol

IRC online conversation

ISP network service provider

IPX interconnection network packet protocol

Inter-IPC process communication

IRQ interrupt request

IP Address IP Address

The IP address is called a network protocol address, which is a 32-bit address assigned to the host, which consists of 4 bytes.

Two types of IP addresses and static IP addresses. The dynamic IP address refers to the address obtained by each connection, and quiet

The status IP address refers to an address that is equally fixed each time. Under normal circumstances, the address taken by phone dialing

All are dynamic, that is, each time the address is different.

IP Masquerade IP camouflage

IP spoofing ip spoof

LAN LAN

LPC partial process call

NNTP Network News Transfer Protocol

PPP point to point protocol

Point to point protocol, is to adapt to those who cannot be online

The user communicates with each other by the connection of the telephone line.

PDC main domain controller

Telnet logs in remote

TCP / IP Transmission Control Protocol / Internet Protocol

The TCP / IP communication protocol mainly includes standards of network communication details on the Internet, and a group of network interconnects

Discussion and path selection algorithm. TCP is a transmission control protocol, which is equivalent to the product packing form, ensuring that the data is not in the transmission process.

Will be lost. IP is a network protocol, which is equivalent to the address and name of the delivery, guaranteeing data to the specified location.

TFTP ordinary file transfer protocol

TFTP is a simplified FTP protocol for transferring information for diskless computers. It is very simple, so curable is hard

On the disc, but also supports no authentication. TFTP is a very unsafe protocol.

Trojan Horse Trojan

URL unified resource locator

UDP User Data News Agreement

VDM virtual DOS machine

UUCP is a file transfer protocol based on the use of cats, sometimes using it to transmit on the Internet.

Usenet news and E-mail, especially in those situated sites. Nowadays, there are very few stations to provide anonymous uucp.

Access files. It is a file transfer protocol, only those users who do not use cats without entering the Internet.

WWW World Wide Web

WWW (Word Wide Web) is the latest information service for Internet. It is a kind of hypertext file

Interactive browsing tool. Users can use WWW to browse, pass, and edit files online.

WAN WAN

Virtual Server Virtual Server

Usenet

User AC Network UseNet is the main source of information of the network news server. Usenet is completely civil spontaneous establishment

Using Internet Exchange Information But not fully dependent on the Internet for communication. Use usenet

Voluntary compliance with some agreed network usage rules.

User name user name

User Account User Account

Web Page

OpenGL open graphics language

ODBC open database connection

PCI peripheral connection interface

Authentication certification, identification

Authorization Authorized a package of Back Office Microsoft

Back UP Backup

Backup Browser Reserve Browser

BDC backup domain controller

Baseline baseline

Bios basic input / output system

Binding, collection

Bit bits, binary positions

BootP boot protocol

BGP boot gateway protocol

Bottleneck bottle diameter

Bridge bridge, bridge

Browser browser

Browsing browsing

Channel channel, pathway

CSU / DSU Channel Services Unit / Digital Service Unit

Checksum checksum

Cluster cluster, cluster

CGI public gateway interface

CGI (Common Gateway Interface Public Gateway Interface is a result of the same result or result with user input

Change the program. It can be written in an explanatory interface language, or a programming language for compilation.

write. CGI specifies the interface protocol standard for the web server to call other executable programs. Web server passes CGI

The order implementation and the interaction of the web browser, that is, the CGI program accepts the information sent to the web server to the web browser,

And will send the response results to the web server and web browser. CGI program generally completes the form data in the web page

Processing, database query and implementation of integration with traditional application systems. Although the CGI program can be designed with any programming

Writing language, but CGI programs written in C are characterized by high speed, high security.

CGI-BASED ATTACK (CGI Attack) It uses the fragile point of the public gateway interface, usually with the WWW station

Point

Crash (crash) system suddenly invalid, need to guide from new guidance

CD-ROM read-only CD

Component components

Data Link Data Link

DataGram Data News

Default Document Default Document

Digital Key System Digital Key Control System

Disk mirroring disk mirror

Distributed File System Distributed File System

Data-Driven Attack relies on hidden or encapsulated data, those data can not be perceived.

Through firewall.

DNS Spoofing (Domain Name Server Electronic Deception) attacker is used to harm the domain name server, can be deceived from the high speed of DNS

One way to implement cache or internal attacks (usually the attacker is in a legal DNS server role)

DOS (嘿, no DOS, this is Denad of Service, extremely served) User maliciously uses network information

When the server will refuse to provide services to legitimate users.

EavesDropping to steal, steal

Encrypted tunnel encrypted channel

Enterprise Network Enterprise Network

Ethernet Ethernet

External Security External Security

Environment Variable environment variable

Fax Modem Fax Cat

File Attribute file properties

File System file system

File file

FORM format

FRAGMENTS segmentation

Frame RELAY

FireWall firewall

Firework is one or a set of systems that enhance security between Internet and intranetp (internal network). Fire prevention

The wall can determine which internal services allow external access, which are licensed access to the allowed internal services, and those external services can be

Internal personnel are accessed. In order to make the firewall play a function, all information from and sent to the Internet must be inserted via a firewall.

The firewall only allows authorization information, and the firewall itself cannot be penetrated.

Gated Daemon Gated process (like an early UNIX search service) GATEWAY gateway

Global Account Global Account

Global Group Global Group

Group group

Group Account group account

Group identifier group identifier

HCL hardware compatibility table

Hash scatter

HPFS high performance file system

Home Directory home directory

Home Page Bamboo Leaf

HOP station, relay section

Host host

Hyperlink hypertext link

Highjacking hijacking terminal, that is, captures the control of another user session for an attacker. This

It is rarely that the target security has been destroyed once it happens.

In fact, Netxray did very good at this point.

Htpasswd A system for protecting WWW (UNIX) sites

Icon icon

Impersonation Attack camouflage attack

INDEX Server Index Server

ISA industrial standard structure

InherieTed Rights Filter inheritance

ISDN integrated business digital network

Interactive User Interactive User

Intermediate system intermediary system

INTERNAL Security internal security

Internet Explorer (IE) IBM's World Wide Web Browser

Internet Server Internet Server

Interpreter Interpretation

Intranet intranet, enterprise internal network

Intruder into the invader

IMAP a mail protocol

It is an abbreviation for Internet Message Access Protocal. IMAP provides a hand of managing emails on remote servers

Segment, it is similar to the POP protocol, but the function is more than POP, including: only download the title of the message, build multiple mailboxes and

A folder that saves the mail on the server.

Java Virtual Machine Java Virtual Machine

JavaS cript is a scripting language based on Java language

Jack in a hacker common spoken language, means that the behavior of the server security

KERNEL kernel

Keys key

KeySpace key space

Keystroke Recorder Some uses of some uses of others to steal others username and password

LAN Server LAN server

Local Security Local Security

Log log, record

Logging login

LOGOFF exits, log out

Logical Port logic port

Logon registration

Logon S cript login script

LFN long file name

Logic Bomb (Logic Bomb) A program or code that can cause system lock or fault.

Mass Browser main browser

MAPI

It is an abbreviation for the Messaging Application Progrmming Interface. Microsoft has developed MAPI and some other companies.

Windows applications can be entered into a variety of messages from Microsoft Mail to Novell MHS. However, MAPI

It is limited to work on daily work, ie sense mail applications, which can exchange emails and data on the network.

MEMBER Server member server

Menu menu

Message message

MultiLink multi-link

MIME Multimedia Internet Mail Extension

MPR multi-protocol router

Multiprocessing multiple processing

Module module

Multihomed host multi-point host

Mud

MUD's English full name is Multiple User Dimension, Multiple User Dialogue or

Multiple User Dungeon, translated as "Multi-person World", "Multi-person Dialogue" or "Multi-person Dungeon", commonly known as "mud" game.

Named pipes named pipe

NDS NetWare directory service

NetBeui NetBIOS extended user interface

NetBIOS Gateway NetBIOS Gateway

NetWare network operating system (I am sorry, I forgot is the company developed)

NetWork network

NetBIOS Network Basic Input / Output System

NDIS network driver interface specification

NetDDE network dynamic data exchange

NIC network interface card

Network Layer Network Layer

NetWork Monitor A Network Monitor

Network Operating System Network Operating System

Network printer network printer

Network security network security

Network user network users

NFS network file system

Node node

NPASSWD UNIX a proxy password checker, which will filter potential passwords before committing to password files.

OSPF Open Shortest Path Priority Agreement

OSI MODEL Open System Interconnect Mode

Out-of-band attack

Packet Filter packet filter

Password password

Path path

PayLoad Net Load

PBX special switch

PCS Personal Communication Business

Peer peer

Permission permissions

Plaintext

PPTP point to point tunnel protocol

Port port

Prority priority

Protocol protocol

Potential Browser Potential Browser

POP Internet email protocol standard

It is the abbreviation of Post Office Protocol and is the Internet email protocol standard. We can have POP

Host Transport and Receive Emails of Service Features. The deficiencies of the agreement are that when you receive an email, all

The letters are cleared from the server and download to your local hard drive. Of course, there are some client programs to

Submail remains on the server or set to more than a certain size file is not available. With multimedia

Format, email will get more and more, we hope to be able to download what files download, when to download, this needs

IMAP protocol. The current version of POP is POP3.

Process process

Proxy agent

Proxy Server Agent Server

Agent service is the agent web user to obtain information, usually use WWW software to connect the end of the remote terminal

When the material is expected, the request signal must be sent and then the transfer of one byte of one byte is back. After the setting of Proxy,

Signal signals will be sent to Proxy Server. When Proxy Server gets the user's request, you will first go to Cache.

Looking for the same information, if there is, you will pass the information directly to the user by Proxy Server, if cache is not

There are information, Proxy Server will use the bandwidth you can use on the network, to retrieve the information on the remote station, while

In Cache, it is transmitted to the user. Even if the line is blocked, it is still more fast than the user yourself.

Paseudorandom pseudo-random

phreaking means the process of controlling the telephone system

RAS Remote Access Service

Remote Control Remote Control

RPC remote process call

Remote boot Remote Boot

Route routing

Router router

Routing routing

RIP routing information protocol

ROUTED DAEMON a Unix Diagnosis Services with RIP

Routing Table Routing Table

R.U.P Routing Update Protocol

RSA A common key encryption algorithm. RSA may be the most popular.

s cript script

SEARCH ENGINE Search Engine SSL Socket Layer

Secure password

SID security identifier

Sender sender

SLIP Serial Line Network Agreement

Server server

Server-based network server-based network

Session Layer Conference Layer

Share, Sharing Sharing

Share-Level Security shared level security

SMTP Simple Mail Transfer Protocol

SNMP Simple Network Management Agreement

Site site

SCSI Small Computer System Interface

SNFFER error detector

Snooping

Standalone Server Independent Server

STRONG CIPHER strong password

Stream Cipher stream password

Strong Password strength

SQL structured query language

Subnet Mask subnet mask

Subdirectory subdirectory

Subnet

SWAP file exchange file

SACL System Access Control Table

S / KEY Safety Connection Disposable Password System, in S / Key, the password will never be transmitted through the network, so it is impossible to be stealing.

Sniffer Secret captures the program of data packets through the network, hackers typically use it to try to steal the username and password.

Spoofing (Electronic Spoof) Any process involving false dressed users or hosts to unauthorized access to the goals

Time Bomb (Time Bomb) refers to a program that waits for a specific time or event first, causing a machine failure.

TCPDump is a utility that captures a packet in UNIX, which is often used to obtain detailed network communication records.

Traceroute A common TCP program on a Unix, generic tracking between local and remote hosts

T0, DS0 56 or 64kbps

T1, DS1 24 PCM digital, total rate is 1.544Mbps

T3, DS3 28 T1 channels, the work can be 44.736Mbps

Thin Client thin client

Thread thread

THROUGHPUT throughput

TRANSPORT LAYER transmission

Transport Protocol Transfer Protocol

Trust Trust

Tunnel security encrypted link

Vector of attack attack vector

Virtual Directory false

Virtual Machine Virtual Machine

VRML Virtual Reality Model Language

Volume file set

Vulnerability vulnerability

WEAK Passwurd Weak Call

Well-KNown Ports Universal Port

Workstation workstation

X.25 a packet switching network protocol

ZONE TRANSFER Region Conversion

转载请注明原文地址:https://www.9cbs.com/read-63854.html

New Post(0)