Search this site
Embedded Files
Skip to main content
Skip to navigation
netsecnotes
Home
Annotated Glossaries
Cloud Services
Definition of Cloud Computing
Cloud Cube Model
SPI Model
Computing
Attribute
Container
Cost
Directory
File
Distributed File System (DFS)
Network File System (NFS)
New Technology File System (NTFS)
IPO Model
Journaling
Namespace
Object
Organizational Unit (OU)
Path
Process
Queue
Redundant Array of Independent Disks (RAID)
Role
Schema
Service
Spool
Languages
C Language
eXtensible Access Control Markup Language (XACML)
Extensible Markup Language (XML)
Hyper Text Markup Language (HTML)
Java
JavaScript
Security Assertion Markup Language (SAML)
Service Provisioning Markup Language (SPML)
Structured Query Language (SQL)
Networking
Access Layer
Bandwidth
Bit
Bridge
Broadcast
Broadcast Domain
Circuit
Circuit Switching
Client
Collision
Collision Domain
Core Layer
Datagram
Delay
Directory Service
Distance-vector
Distribution Layer
Domain
Encapsulation
Extranet
Frame
Hierarchical Internetworking Model
Host
Hub
Intranet
Latency
Layer
Link-state
Management Models
Multicast
Multiplexing
Network Address Translation (NAT)
Network Attached Storage (NAS)
Open Systems Interconnection (OSI) Model
Packet
Packet Switching
Protocol
Protocol Data Unit (PDU)
Quality of Service (QoS)
Repeater
Router
Segment
Server
Signal
Storage Area Network (SAN)
Subnet
Switch
TCP/IP Model
Throughput
Topology
Tunneling
Unicast
Virtual Circuit (VC)
VLAN
Voice over IP (VoIP)
Zone
Organizations
Cloud Security Alliance (CSA)
Ecma International
Institute of Electrial and Electronics Engineers (IEEE)
International Council of E-Commerce Consultants (EC-Council)
International Information Systems Security Certification Consortium ((ISC)2)
International Organization for Standardization (ISO)
Internet Assigned Numbers Authority (IANA)
Internet Corporation for Assigned Names and Numbers (ICANN)
Internet Engineering Task Force (IETF)
National Institute of Standards and Technology (NIST)
Open Group Jericho Forum
Open Web Application Security Project (OWASP)
Organization for the Advancement of Structured Information Standards (OASIS)
Payment Card Industry Security Standards Council (PCI)
Telecommunication Standardization Sector of the International Telecommunications Union (ITU-T)
World Wide Web Consortium (W3C)
Protocols
802.1X
Address Resolution Protocol (ARP)
Bluetooth
Border Gateway Protocol (BGP)
Challenge-Handshake Authentication Protocol (CHAP)
MS-CHAP
Checksum
Cisco Discovery Protocol (CDP)
CSMA/CA
CSMA/CD
CUPS
Cyclic Redundancy Check (CRC)
Distinguished Name
Domain Name System (DNS)
DNS Labels
DNS Lookup
Dynamic DNS (DDNS)
Dynamic Host Configuration Protocol (DHCP)
Ethernet
Extensible Authentication Protocol (EAP)
EAP Methods
File Transfer Protolcol (FTP)
Finger
Frame Relay
Generic Routing Encapsulation (GRE)
H.323
Hypertext Transfer Protocol (HTTP)
Internet Control Message Protocol (ICMP)
Internet Group Management Protocol (IGMP)
Internet Message Access Protocol 4 (IMAP4)
Internet Printing Protocol (IPP)
Internet Protocol (IP)
Internet Protocol Security (IPsec)
Internet Key Exchange (IKE)
Internetwork Packet Exchange (IPX)
IPv6
Stateless Address AutoConfiguration (SLAAC)
Kerberos
Key Management Interoperability Protocol (KMIP)
Layer 2 Tunneling Protocol (L2TP)
Lightweight Directory Access Protocol (LDAP)
Line Printer Deamon protocol (LPD)
NetBIOS Extended User Interface (NetBEUI)
NetBIOS over TCP/IP (NetBT)
Network Basic Input/Output System (NetBIOS)
Network Information Service (NIS)
Open Shortest Path First (OSPF)
Parity
Password Authentication Protocol (PAP)
Point-to-Point Protocol (PPP)
Multilink PPP (MP)
Point-to-Point Tunneling Protocol (PPTP)
Port
Post Office Protocol 3 (POP3)
RADIUS
Reliable Multicast Protocol
Remote Desktop Protocol (RDP)
RFC 1918 Private Addressing
Routing Information Protocol (RIP)
Secure Shell (SSH)
Secure Socket Tunneling Protocol (SSTP)
Secure Sockets Layer (SSL)
Serial Line Internet Protocol (SLIP)
Server Message Block (SMB)
Session Initiation Protocol (SIP)
Simple Mail Transport Protocol (SMTP)
Simple Network Management Protocol (SNMP)
SOCKet Secure (SOCKS)
Spanning Tree Protocol (STP)
Stream Control Transmission Protocol (SCTP)
TACACS+
Telnet
Transmission Control Protocol (TCP)
Trivial File Transfer Protocol (TFTP)
Uniform Resource Locator (URL)
User Datagram Protocol (UDP)
Virtual Router Redundancy Protocol (VRRP)
WiFi
WiFi Protected Access (WPA & WPA2)
WiMAX
Windows Internet Name Service (WINS)
Wired Equivalent Privacy (WEP)
X.500
Security
AAA
Access Control
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
RBAC
Access Control List (ACL)
ARTS
Asset
Authentication
Availability
Beckstrom's Law
CIA Triad
Compliance
Computer Fraud and Abuse Act (CFAA)
Cyber Security Enhancement Act of 2002 (CSEA)
Family Educational Rights and Privacy Act (FERPA)
Federal Information Processing Standards (FIPS)
Federal Information Security Management Act (FISMA)
Gramm–Leach–Bliley Act (GLBA)
Health Insurance Portability and Accountability Act (HIPAA)
Payment Card Industry Data Security Standard (PCI DSS)
Sarbanes–Oxley Act of 2002 (SOX)
Confidentiality
Control
Data Loss Prevention (DLP)
Defense in Depth
Demilitarized Zone (DMZ)
Denial of Service (DoS)
Distributed Denial of Service (DDoS)
Digital Certificate
Digital Signature
Encryption
Block Cipher
Diffie-Hellman Key Exchange Protocol
Stream Cipher
Exploit
Buffer Overflow Attack
Cross-site Scripting (XSS)
Exploit Glossary
LAND Attack
Man-in-the-Middle (MITM)
Masquerade Attack
Ping of Death
Smurf
Social Engineering
Spoofing
SQL Injection
SYN Flood
Federated Identity
Firewall
Web Application Firewall (WAF)
Hacker
Integrity
Intrusion Detection System (IDS)
Intrusion Prevention System (IPS)
Malware
Network Access Control (NAC)
Penetration Testing
Proxy
Redundancy
Risk
Security Information and Event Management (SIEM)
Separation of Duties
Strategy
Threat
Advanced Persistent Threat (APT)
Dolev-Yao Adversary Model
Tool
Active Directory (AD)
Access Control List (ACL) Types
Domain Controller (DC)
Group Policy Object (GPO)
Security Group
Site
Tree and Forest
Trust Types
NT LAN Manager (NTLM)
Tor
Trust
Virtual Private Network (VPN)
Vulnerability
References
Study Guides
Basic Networking
Basic Security
Network Segmentation
Perimeter Security
Web Security
Wide Area & Remote Access Networks
Technologies by Layer
Layer 1 - Physical
Layer 2 - Data Link
Layer 3 - Network
Layer 4 - Transport
Layer 5 - Session
Layer 6 - Presentation
Layer 7 - Application
netsecnotes
Home
Annotated Glossaries
Cloud Services
Definition of Cloud Computing
Cloud Cube Model
SPI Model
Computing
Attribute
Container
Cost
Directory
File
Distributed File System (DFS)
Network File System (NFS)
New Technology File System (NTFS)
IPO Model
Journaling
Namespace
Object
Organizational Unit (OU)
Path
Process
Queue
Redundant Array of Independent Disks (RAID)
Role
Schema
Service
Spool
Languages
C Language
eXtensible Access Control Markup Language (XACML)
Extensible Markup Language (XML)
Hyper Text Markup Language (HTML)
Java
JavaScript
Security Assertion Markup Language (SAML)
Service Provisioning Markup Language (SPML)
Structured Query Language (SQL)
Networking
Access Layer
Bandwidth
Bit
Bridge
Broadcast
Broadcast Domain
Circuit
Circuit Switching
Client
Collision
Collision Domain
Core Layer
Datagram
Delay
Directory Service
Distance-vector
Distribution Layer
Domain
Encapsulation
Extranet
Frame
Hierarchical Internetworking Model
Host
Hub
Intranet
Latency
Layer
Link-state
Management Models
Multicast
Multiplexing
Network Address Translation (NAT)
Network Attached Storage (NAS)
Open Systems Interconnection (OSI) Model
Packet
Packet Switching
Protocol
Protocol Data Unit (PDU)
Quality of Service (QoS)
Repeater
Router
Segment
Server
Signal
Storage Area Network (SAN)
Subnet
Switch
TCP/IP Model
Throughput
Topology
Tunneling
Unicast
Virtual Circuit (VC)
VLAN
Voice over IP (VoIP)
Zone
Organizations
Cloud Security Alliance (CSA)
Ecma International
Institute of Electrial and Electronics Engineers (IEEE)
International Council of E-Commerce Consultants (EC-Council)
International Information Systems Security Certification Consortium ((ISC)2)
International Organization for Standardization (ISO)
Internet Assigned Numbers Authority (IANA)
Internet Corporation for Assigned Names and Numbers (ICANN)
Internet Engineering Task Force (IETF)
National Institute of Standards and Technology (NIST)
Open Group Jericho Forum
Open Web Application Security Project (OWASP)
Organization for the Advancement of Structured Information Standards (OASIS)
Payment Card Industry Security Standards Council (PCI)
Telecommunication Standardization Sector of the International Telecommunications Union (ITU-T)
World Wide Web Consortium (W3C)
Protocols
802.1X
Address Resolution Protocol (ARP)
Bluetooth
Border Gateway Protocol (BGP)
Challenge-Handshake Authentication Protocol (CHAP)
MS-CHAP
Checksum
Cisco Discovery Protocol (CDP)
CSMA/CA
CSMA/CD
CUPS
Cyclic Redundancy Check (CRC)
Distinguished Name
Domain Name System (DNS)
DNS Labels
DNS Lookup
Dynamic DNS (DDNS)
Dynamic Host Configuration Protocol (DHCP)
Ethernet
Extensible Authentication Protocol (EAP)
EAP Methods
File Transfer Protolcol (FTP)
Finger
Frame Relay
Generic Routing Encapsulation (GRE)
H.323
Hypertext Transfer Protocol (HTTP)
Internet Control Message Protocol (ICMP)
Internet Group Management Protocol (IGMP)
Internet Message Access Protocol 4 (IMAP4)
Internet Printing Protocol (IPP)
Internet Protocol (IP)
Internet Protocol Security (IPsec)
Internet Key Exchange (IKE)
Internetwork Packet Exchange (IPX)
IPv6
Stateless Address AutoConfiguration (SLAAC)
Kerberos
Key Management Interoperability Protocol (KMIP)
Layer 2 Tunneling Protocol (L2TP)
Lightweight Directory Access Protocol (LDAP)
Line Printer Deamon protocol (LPD)
NetBIOS Extended User Interface (NetBEUI)
NetBIOS over TCP/IP (NetBT)
Network Basic Input/Output System (NetBIOS)
Network Information Service (NIS)
Open Shortest Path First (OSPF)
Parity
Password Authentication Protocol (PAP)
Point-to-Point Protocol (PPP)
Multilink PPP (MP)
Point-to-Point Tunneling Protocol (PPTP)
Port
Post Office Protocol 3 (POP3)
RADIUS
Reliable Multicast Protocol
Remote Desktop Protocol (RDP)
RFC 1918 Private Addressing
Routing Information Protocol (RIP)
Secure Shell (SSH)
Secure Socket Tunneling Protocol (SSTP)
Secure Sockets Layer (SSL)
Serial Line Internet Protocol (SLIP)
Server Message Block (SMB)
Session Initiation Protocol (SIP)
Simple Mail Transport Protocol (SMTP)
Simple Network Management Protocol (SNMP)
SOCKet Secure (SOCKS)
Spanning Tree Protocol (STP)
Stream Control Transmission Protocol (SCTP)
TACACS+
Telnet
Transmission Control Protocol (TCP)
Trivial File Transfer Protocol (TFTP)
Uniform Resource Locator (URL)
User Datagram Protocol (UDP)
Virtual Router Redundancy Protocol (VRRP)
WiFi
WiFi Protected Access (WPA & WPA2)
WiMAX
Windows Internet Name Service (WINS)
Wired Equivalent Privacy (WEP)
X.500
Security
AAA
Access Control
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
RBAC
Access Control List (ACL)
ARTS
Asset
Authentication
Availability
Beckstrom's Law
CIA Triad
Compliance
Computer Fraud and Abuse Act (CFAA)
Cyber Security Enhancement Act of 2002 (CSEA)
Family Educational Rights and Privacy Act (FERPA)
Federal Information Processing Standards (FIPS)
Federal Information Security Management Act (FISMA)
Gramm–Leach–Bliley Act (GLBA)
Health Insurance Portability and Accountability Act (HIPAA)
Payment Card Industry Data Security Standard (PCI DSS)
Sarbanes–Oxley Act of 2002 (SOX)
Confidentiality
Control
Data Loss Prevention (DLP)
Defense in Depth
Demilitarized Zone (DMZ)
Denial of Service (DoS)
Distributed Denial of Service (DDoS)
Digital Certificate
Digital Signature
Encryption
Block Cipher
Diffie-Hellman Key Exchange Protocol
Stream Cipher
Exploit
Buffer Overflow Attack
Cross-site Scripting (XSS)
Exploit Glossary
LAND Attack
Man-in-the-Middle (MITM)
Masquerade Attack
Ping of Death
Smurf
Social Engineering
Spoofing
SQL Injection
SYN Flood
Federated Identity
Firewall
Web Application Firewall (WAF)
Hacker
Integrity
Intrusion Detection System (IDS)
Intrusion Prevention System (IPS)
Malware
Network Access Control (NAC)
Penetration Testing
Proxy
Redundancy
Risk
Security Information and Event Management (SIEM)
Separation of Duties
Strategy
Threat
Advanced Persistent Threat (APT)
Dolev-Yao Adversary Model
Tool
Active Directory (AD)
Access Control List (ACL) Types
Domain Controller (DC)
Group Policy Object (GPO)
Security Group
Site
Tree and Forest
Trust Types
NT LAN Manager (NTLM)
Tor
Trust
Virtual Private Network (VPN)
Vulnerability
References
Study Guides
Basic Networking
Basic Security
Network Segmentation
Perimeter Security
Web Security
Wide Area & Remote Access Networks
Technologies by Layer
Layer 1 - Physical
Layer 2 - Data Link
Layer 3 - Network
Layer 4 - Transport
Layer 5 - Session
Layer 6 - Presentation
Layer 7 - Application
More
Home
Annotated Glossaries
Cloud Services
Definition of Cloud Computing
Cloud Cube Model
SPI Model
Computing
Attribute
Container
Cost
Directory
File
Distributed File System (DFS)
Network File System (NFS)
New Technology File System (NTFS)
IPO Model
Journaling
Namespace
Object
Organizational Unit (OU)
Path
Process
Queue
Redundant Array of Independent Disks (RAID)
Role
Schema
Service
Spool
Languages
C Language
eXtensible Access Control Markup Language (XACML)
Extensible Markup Language (XML)
Hyper Text Markup Language (HTML)
Java
JavaScript
Security Assertion Markup Language (SAML)
Service Provisioning Markup Language (SPML)
Structured Query Language (SQL)
Networking
Access Layer
Bandwidth
Bit
Bridge
Broadcast
Broadcast Domain
Circuit
Circuit Switching
Client
Collision
Collision Domain
Core Layer
Datagram
Delay
Directory Service
Distance-vector
Distribution Layer
Domain
Encapsulation
Extranet
Frame
Hierarchical Internetworking Model
Host
Hub
Intranet
Latency
Layer
Link-state
Management Models
Multicast
Multiplexing
Network Address Translation (NAT)
Network Attached Storage (NAS)
Open Systems Interconnection (OSI) Model
Packet
Packet Switching
Protocol
Protocol Data Unit (PDU)
Quality of Service (QoS)
Repeater
Router
Segment
Server
Signal
Storage Area Network (SAN)
Subnet
Switch
TCP/IP Model
Throughput
Topology
Tunneling
Unicast
Virtual Circuit (VC)
VLAN
Voice over IP (VoIP)
Zone
Organizations
Cloud Security Alliance (CSA)
Ecma International
Institute of Electrial and Electronics Engineers (IEEE)
International Council of E-Commerce Consultants (EC-Council)
International Information Systems Security Certification Consortium ((ISC)2)
International Organization for Standardization (ISO)
Internet Assigned Numbers Authority (IANA)
Internet Corporation for Assigned Names and Numbers (ICANN)
Internet Engineering Task Force (IETF)
National Institute of Standards and Technology (NIST)
Open Group Jericho Forum
Open Web Application Security Project (OWASP)
Organization for the Advancement of Structured Information Standards (OASIS)
Payment Card Industry Security Standards Council (PCI)
Telecommunication Standardization Sector of the International Telecommunications Union (ITU-T)
World Wide Web Consortium (W3C)
Protocols
802.1X
Address Resolution Protocol (ARP)
Bluetooth
Border Gateway Protocol (BGP)
Challenge-Handshake Authentication Protocol (CHAP)
MS-CHAP
Checksum
Cisco Discovery Protocol (CDP)
CSMA/CA
CSMA/CD
CUPS
Cyclic Redundancy Check (CRC)
Distinguished Name
Domain Name System (DNS)
DNS Labels
DNS Lookup
Dynamic DNS (DDNS)
Dynamic Host Configuration Protocol (DHCP)
Ethernet
Extensible Authentication Protocol (EAP)
EAP Methods
File Transfer Protolcol (FTP)
Finger
Frame Relay
Generic Routing Encapsulation (GRE)
H.323
Hypertext Transfer Protocol (HTTP)
Internet Control Message Protocol (ICMP)
Internet Group Management Protocol (IGMP)
Internet Message Access Protocol 4 (IMAP4)
Internet Printing Protocol (IPP)
Internet Protocol (IP)
Internet Protocol Security (IPsec)
Internet Key Exchange (IKE)
Internetwork Packet Exchange (IPX)
IPv6
Stateless Address AutoConfiguration (SLAAC)
Kerberos
Key Management Interoperability Protocol (KMIP)
Layer 2 Tunneling Protocol (L2TP)
Lightweight Directory Access Protocol (LDAP)
Line Printer Deamon protocol (LPD)
NetBIOS Extended User Interface (NetBEUI)
NetBIOS over TCP/IP (NetBT)
Network Basic Input/Output System (NetBIOS)
Network Information Service (NIS)
Open Shortest Path First (OSPF)
Parity
Password Authentication Protocol (PAP)
Point-to-Point Protocol (PPP)
Multilink PPP (MP)
Point-to-Point Tunneling Protocol (PPTP)
Port
Post Office Protocol 3 (POP3)
RADIUS
Reliable Multicast Protocol
Remote Desktop Protocol (RDP)
RFC 1918 Private Addressing
Routing Information Protocol (RIP)
Secure Shell (SSH)
Secure Socket Tunneling Protocol (SSTP)
Secure Sockets Layer (SSL)
Serial Line Internet Protocol (SLIP)
Server Message Block (SMB)
Session Initiation Protocol (SIP)
Simple Mail Transport Protocol (SMTP)
Simple Network Management Protocol (SNMP)
SOCKet Secure (SOCKS)
Spanning Tree Protocol (STP)
Stream Control Transmission Protocol (SCTP)
TACACS+
Telnet
Transmission Control Protocol (TCP)
Trivial File Transfer Protocol (TFTP)
Uniform Resource Locator (URL)
User Datagram Protocol (UDP)
Virtual Router Redundancy Protocol (VRRP)
WiFi
WiFi Protected Access (WPA & WPA2)
WiMAX
Windows Internet Name Service (WINS)
Wired Equivalent Privacy (WEP)
X.500
Security
AAA
Access Control
Discretionary Access Control (DAC)
Mandatory Access Control (MAC)
RBAC
Access Control List (ACL)
ARTS
Asset
Authentication
Availability
Beckstrom's Law
CIA Triad
Compliance
Computer Fraud and Abuse Act (CFAA)
Cyber Security Enhancement Act of 2002 (CSEA)
Family Educational Rights and Privacy Act (FERPA)
Federal Information Processing Standards (FIPS)
Federal Information Security Management Act (FISMA)
Gramm–Leach–Bliley Act (GLBA)
Health Insurance Portability and Accountability Act (HIPAA)
Payment Card Industry Data Security Standard (PCI DSS)
Sarbanes–Oxley Act of 2002 (SOX)
Confidentiality
Control
Data Loss Prevention (DLP)
Defense in Depth
Demilitarized Zone (DMZ)
Denial of Service (DoS)
Distributed Denial of Service (DDoS)
Digital Certificate
Digital Signature
Encryption
Block Cipher
Diffie-Hellman Key Exchange Protocol
Stream Cipher
Exploit
Buffer Overflow Attack
Cross-site Scripting (XSS)
Exploit Glossary
LAND Attack
Man-in-the-Middle (MITM)
Masquerade Attack
Ping of Death
Smurf
Social Engineering
Spoofing
SQL Injection
SYN Flood
Federated Identity
Firewall
Web Application Firewall (WAF)
Hacker
Integrity
Intrusion Detection System (IDS)
Intrusion Prevention System (IPS)
Malware
Network Access Control (NAC)
Penetration Testing
Proxy
Redundancy
Risk
Security Information and Event Management (SIEM)
Separation of Duties
Strategy
Threat
Advanced Persistent Threat (APT)
Dolev-Yao Adversary Model
Tool
Active Directory (AD)
Access Control List (ACL) Types
Domain Controller (DC)
Group Policy Object (GPO)
Security Group
Site
Tree and Forest
Trust Types
NT LAN Manager (NTLM)
Tor
Trust
Virtual Private Network (VPN)
Vulnerability
References
Study Guides
Basic Networking
Basic Security
Network Segmentation
Perimeter Security
Web Security
Wide Area & Remote Access Networks
Technologies by Layer
Layer 1 - Physical
Layer 2 - Data Link
Layer 3 - Network
Layer 4 - Transport
Layer 5 - Session
Layer 6 - Presentation
Layer 7 - Application
Container
A container is an
object
composed of collections of other objects.
Google Sites
Report abuse
Page details
Page updated
Google Sites
Report abuse