IPv6 security Definitions

Browse Definitions
Search Definitions
  • #

    5 terms you need to know before you employ VoIP

    Learn five important terms every organization should understand before deploying Voice over IP (VoIP) telephony.

  • A

    Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher used by the U.S. government to protect classified information and is implemented in software and hardware throughout the world to encrypt sensitive data.

  • advanced evasion technique (AET)

    An advanced evasion technique (AET) is a type of network attack that combines several different known evasion techniques on-the-fly to create a new technique that won't be recognized by an intrusion detection system

  • D

    digest authentication

    Digest authentication is a method of authentication in which a request from a potential user is received by a network server and then sent to a domain controller... (Continued)

  • I

    IGP (Interior Gateway Protocol)

    An IGP (Interior Gateway Protocol) is a protocol for exchanging routing information between gateways (hosts with routers) within an autonomous network (for example, a system of corporate local area networks).

  • IP spoofing (IP address forgery or a host file hijack)

    IP spoofing, also known as IP address forgery, is a hijacking technique in which the attacker masquerades as a trusted host to conceal his identity, hijack browsers, or gain access to a network. The hijacker obtains the IP address of a legitimate host and alters packet headers so that the legitimate host appears to be the source....

  • M

    MD5

    The MD5 hashing algorithm is a one-way cryptographic function that accepts a message of any length as input and returns as output a fixed-length digest value to be used for authenticating the original message.

  • P

    phlashing

    Phlashing is a permanent denial of service (PDoS) attack that exploits a vulnerability in network-based firmware updates. Such an attack is currently theoretical but if carried out could render the target device inoperable... (Continued)

  • probe

    In telecommunications generally, a probe is an action taken or an object used for the purpose of learning something about the state of the network.

  • S

    Secure Shell (SSH)

    Secure Shell (SSH) is a network protocol that secures data communications between computers on an insecure network using strong authentication and encryption. SSH also refers to the utility suite that implements the protocol, and which can be used to enable terminal sessions, file transfers and remote command execution.

  • Secure Sockets Layer (SSL)

    Secure Sockets Layer (SSL) is a computer networking protocol for securing connections between network application clients and servers over an insecure network, such as the internet.

  • smurfing

    A smurf attack is an exploitation of the Internet Protocol (IP) broadcast addressing to create a denial of service.

  • SSL certificate (Secure Sockets Layer certificate)

    A Secure Sockets Layer certificate, known commonly as an SSL certificate, is a small data file installed on a Web server that allows for a secure connection between a Web server and a Web browser.

  • T

    threat modeling

    Threat modeling is a procedure for optimizing network security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of, threats to the system...

  • Transport Layer Security (TLS)

    The Transport Layer Security (TLS) protocol defines a mechanism to encrypt and maintain data integrity for communications over a network.

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close