Acronyms Flashcards
AAAA
Authentication, authorization, accounting, auditing
ACL
Access Control List
AES
Advanced Encryption Standard
-symmetric key encryption (not used for key exchanges)
AH
Authentication Header
AP
Access Point
APC
Angled Physical Contact
APIPA
Automatic Private Internet Protocol Addressing
ARP
Address Resolution Protocol
-creates binding between IP address and MAC address inside LAN
-arp table sets on routers and switches so data can be moved through routers with ip and then transferred to mac on the switch of right network and sent to client.
AUP
Acceptable Use Policy
BGP
Border Gateway Protocol
BNC
British Naval Connector/Bayonet Neill-Concelman
BYOD
Bring Your Own Device
CAM
Content Addressable Memory (table)
CAN
Campus Area Network
CDMA
Code Devision Media Access
Do not use SIM cards
Provider manage handset
Requires each subscriber device to use a code to key the modulation of their signal
CIA
Confidentiality, Integrity, and Availability
CIDR
Classless Inter-Domain Routing
CLI
Command Line Interface
CNAME
Canonical Name
CPU
Central Processing Unit
CRC
Cyclic Redundancy Check
CSMA/CA
Carrier-Sense Multiple Access with Collision Avoidance
CSU
Channel Service Unit
CVE
Common Vulnerabilities and Exposures
CWDM
Coarse Wavelength Division Multiplexing
DaaS
Desktop as a Service
dB
Decibel
DDoS
Distributed Denial of Service
-multiple attackers asking one victim for services
DHCP
Dynamic Host Configuration Protocol
DLP
Data Loss Prevention
DNS
Domain Name System
DoS
Denial of Service
-1 machine floods a victim with requests for services
-tcp syn flood (tcp handshakes that never completed by masking server send syn ack to a spoofed ips
-Smurf attack (icmp flood): attacker sends ping to subnet broadcast with spoofed source ip set to be the ip of the victim server
DSL
Digital Subscriber Line
DSU
Data Service Unit
DWDM
Dense Wavelength Devision Multiplexing
EAP
Extensible Authentication Protocol
-uses different mechanisms of authentication
EIA
Electronic Industries Association
EIGRP
Enhance Interior Gateway Routing Protocol
EIRP
Effective Isotropic Radiated Power
ESP
Encapsulating Security Protocol
EUI
Extended Unique Identifier
FCoE
Fibre Channel over Ethernet
FHRP
First Hop Redundancy Protocol
FTP
File Transfer Protocol
GBIC
Gigabit Interface Converter
GRE
Generic Routing Encapsulation
-tunneling protocol / does not provide encryption
-think of ferry encapsulate car over water
GSM
Global System for Mobile Communication
-use TDMA (time division multiple access)
-subscribers can use SIM card on an unlocked handset
HA
High Availability
HDMI
High Definition Multimedia Interface
HTTP
Hypertext Transfer Protocol
HTTPS
Hypertext Transfer Protocol Secure
HVAC
Heating, Ventilation and Air Conditioning
IaaS
Infrastructure as a Service
Microsoft’s azure virtual machines
Amazon’s elastic compute cloud
ICMP
Internet Control Message Protocol
ICS
Industrial Control System
IDF
Intermediate Distribution Frame
IDS
Intrusion Detection System
IGMP
Internet Group Management Protocol
IMAP
Internet Message Access Protocol
IoT
Internet of Things
IP
Internet Protocol
IPS
Intrusion Prevention System
-uses bits of patterns called data signatures to identify common network attacks
IPSec
Internet Protocol Security
-used in securing key exchange during establishment of client to server vpn connection
-uses ISAKMP
IPv4
Internet Protocol version 4
IPv6
Internet Protocol version 6
iSCSI
Internet Small Computer Systems Interface
ISP
Internet Service Provider
LACP
Link Aggregation Control Protocol
LAN
Local Area Network
LC
Logic Connector
LDAP
Lightweight Directory Access Protocol
LDAPS
Lightweight Directory Access Protocol (over SSL)