Cisco's ‘Application Centric Infrastructure' vs. SDN

Network Protocols and Security

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • IPv6 address

    An IPv6 address is a 128-bit alphanumeric string that identifies an endpoint device in the Internet Protocol Version 6 (IPv6) addressing scheme. The new IP address format was created to enable the trillions of new IP addresses required to connect no... 

  • advanced evasion technique (AET)

    An advanced evasion technique (AET) is a type of network attack that combines several different known evasion techniques on-the-fly to create a new technique that won't be recognized by an intrusion detection system 

  • phlashing

    Phlashing is a permanent denial of service (PDoS) attack that exploits a vulnerability in network-based firmware updates. Such an attack is currently theoretical but if carried out could render the target device inoperable... (Continued) 

  • smurfing

    A smurf attack is an exploitation of the Internet Protocol (IP) broadcast addressing to create a denial of service. 

  • IP spoofing (IP address forgery or a host file hijack)

    IP spoofing, also known as IP address forgery, is a hijacking technique in which the attacker masquerades as a trusted host to conceal his identity, hijack browsers, or gain access to a network. The hijacker obtains the IP address of a legitimate ho... 

  • IGP (Interior Gateway Protocol)

    An IGP (Interior Gateway Protocol) is a protocol for exchanging routing information between gateways (hosts with routers) within an autonomous network (for example, a system of corporate local area networks). 

  • 5 terms you need to know before you employ VoIP

    Learn five important terms every organization should understand before deploying Voice over IP (VoIP) telephony. 

  • digest authentication

    Digest authentication is a method of authentication in which a request from a potential user is received by a network server and then sent to a domain controller... (Continued) 

  • Secure Sockets Layer (SSL)

    SSL (Secure Sockets Layer) is a commonly-used protocol for managing the security of a message transmission on the Internet; it uses a program layer located between the Internet's HTTP and TCP program layers. 

  • Transport Layer Security (TLS)

    Transport Layer Security (TLS) is a protocol that ensures privacy between communicating applications and their users on the Internet. 

  • See more Definitions on Network Protocols and Security
About Network Protocols and Security

Get advice on best practices for network protocols -- VoIP, TCP/IP, FTP. Learn how to protect data and secure communication to prevent hacker attacks.