Day 9 Reversed Flashcards
MPLS
Multi-protocol Label Switching
This is used by WAN providers to quickly forward data using short and discrete labels, rather than complex network addresses.
MSCHAP
Microsoft Challenge Handshake Authentication Protocol
Uses an initial handshake to create a nonce added to the hashed ID and secret to create varying outputs.
MSP
Managed Service Provider
A specialty provider of IT services management contracted by a client.
MSSP
Managed Security Service Provider
A contracted service wherein an outside party manages, monitors and maintains security services, including firewalls, intrusion detection, virtual private networks
and end point security.
MTBF
Mean Time Between Failures
The estimation as to how often serious errors occur, typically measured in thousands of hours.
MTTR
Mean Time to Recover or Mean Time to Repair
A standard recovery statistic indicating swiftness of DRP responses.
MTU
Maximum Transmission Unit
The maximum number of bytes allowed within a datalink technology.
NAC
Network Access Control
A technology primarily used for local access control that may involve MAC addresses and 802.1x.
NAS
Network-attached Storage
File oriented storage of computer information across the network on a central device that may be using multiple storage media.
NAT
Network Address Translation
This is commonly implemented by firewalls and is used to remap address space on the inside to one or several addresses on the outside edge.
NDA
Non-disclosure Agreement
A legally binding agreement, compelling parties to not reveal information to others.
NFC
Near Field Communication
This is a short range wireless technology, commonly used for payment systems and person-to-person data exchanges.
NFV
Network Function Virtualization
An architectural concept that utilizes virtual machines and virtual infrastructures to connect and manage networks.
NGFW
Next-generation Firewall
Considered a third-generation technology, this type of firewall implements multiple security measures, such as filtering, VPN, social media monitoring and more to
provide protection.
NG-SWG
Next-generation Secure Web Gateway
A cloud-based defensive measure designed to protect users from web-based threats and to provide enforcement of corporate policies.
NIC
Network Interface Card
The layer 2 device that physically connects a system to a network.
NIDS
Network-based Intrusion Detection System
The technology used to scan, packet data for threats and exploits.
NIPS
Network-based Intrusion Prevention System
A technology that identifies and stops attacks by inspecting network information.
NIST
National Institute of Standards & Technology
A government group that publishes recommendations and standards, many related to IT security.
NOC
Network Operations Center
IT network management, monitoring and control are performed here.
NOP
No operation
A common element in memory corruption attacks.
NTFS
New Technology File System
The file system used by Windows that incorporates multilevel security.
NTP
Network Time Protocol
A UDP protocol designed to synchronize time across a network.
This protocol is necessary to support Kerberos and its requirement for close chronograph management.
OAUTH
Open Authorization
An authentication mechanism that allows secure delegated access.