Domain 4.2: Communication and Network Security Flashcards

Understand key network and communication security terms, protocols, and architectures.

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define:

Private Branch Exchange

(PBX)

A

A telephone network within an organization that allows internal and external communication.

A private telephone network used within an organization that allows users to communicate internally and externally. Modern PBX systems can integrate with VoIP and provide advanced features like call forwarding, voicemail, and conference calling.

Or visit this Wikipedia page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define:

Private IP Addresses

A

Non-publicly routable IP addresses used within private networks for device identification.

IP addresses that are not publicly routable and are used within a private network. It is used in local area networks (LANs) and virtual private networks (VPNs) to identify and communicate with devices within the network. Examples include the IP address ranges reserved for private use, such as 10.0.0.0/8, 172.16.0.0/12, and 192.168.0.0/16.

For more information, view this lecture on IP addresses, MAC addresses, and port numbers- Part 3.. Or visit this Wikipedia page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Define:

Private Key

A

A secret cryptographic key used in asymmetric encryption for decrypting data or creating digital signatures.

A cryptographic key that is kept secret and used for encrypting and decrypting data. It is used in asymmetric cryptography, where the public key is used for encryption, and the private key is used for decryption. Examples include private keys used for secure communication and authentication in protocols such as SSL/TLS and SSH.

For more information, view this lecture on Asymmetric encryption- Part 1.. Or visit this Wikipedia page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define:

Proactive Network Management

A

The practice of monitoring and addressing network issues before they impact operations.

Proactive Network Management involves continuously monitoring network performance and health to detect potential issues early. By analyzing network data, setting alerts, and performing regular maintenance, administrators can resolve problems before they escalate into major outages or service degradations. This approach minimizes downtime, ensures optimal performance, and supports a resilient, secure network infrastructure.

For more information, view this lecture on Network Performance and Traffic Management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define:

Promiscuous Mode

A

A network mode allowing a device to intercept all traffic, used for monitoring or eavesdropping.

A networking mode in which a device can receive all incoming traffic, regardless of whether it is addressed to it or not. It is used in security assessments to capture network traffic for analysis. Examples include promiscuous mode on network switches, promiscuous mode on network analyzers, and promiscuous mode on virtual machines.

For more information, view this lecture on IP addresses, MAC addresses, and port numbers- Part 2.. Or visit this Wikipedia page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define:

Protected Extensible Authentication Protocol

(PEAP)

A

A protocol enhancing wireless network security by using an encrypted TLS tunnel.

Protected Extensible Authentication Protocol (PEAP) is an authentication protocol that encapsulates Extensible Authentication Protocol (EAP) within an encrypted and authenticated Transport Layer Security (TLS) tunnel. It is used to enhance the security of wireless networks and VPNs by ensuring that client credentials are transmitted securely over potentially vulnerable or untrusted networks.

For more information, view this lecture on Network authentication protocols.. Or visit this Wikipedia page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define:

Protocol

A

A set of rules governing data exchange between devices, enabling communication over a network.

A set of rules and standards that govern the communication between two or more devices or systems. This is commonly used in networking and communication systems to ensure that different devices and systems can communicate with each other in a consistent and reliable manner. Examples include TCP/IP and HTTP.

For more information, view this lecture on Networking basics and definitions.. Or visit this Wikipedia page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define:

Protocol Converter

A

A device or software that allows data exchange between systems using different protocols.

A device or software that converts data from one protocol to another, allowing different devices and systems to communicate with each other. This is commonly used in networking and communication systems to enable compatibility between different protocols. Examples include modems and gateways.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Define:

Protocol Stack

A

A set of network protocols that work together to enable communication over a network.

A layered set of protocols that are used to implement a particular networking or communication system. This is commonly used in networking and communication systems to provide a complete and consistent set of protocols for a particular application. Examples include the OSI model and the TCP/IP stack.

Or visit this Wikipedia page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define:

Proxy

(and Proxy Server)

A

A server that intermediates requests between clients and other servers, often for security or anonymity.

A system that acts as an intermediary between a client and a server, often used to mask the client’s identity, implement access policies, cache content, and improve performance. Proxies can function at various levels of the network protocol stack and are widely used to enhance security, privacy, and control over internet traffic.

For more information, view this lecture on Firewalls Part 1. Or visit this Wikipedia page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define:

Public IP

A

An IP address that is accessible over the Internet for global communication.

A Public IP is an Internet-routable address assigned to a network device to enable connectivity with systems worldwide. It uniquely identifies a device or network on the Internet, allowing it to interact with external hosts. Public IP addresses are essential for hosting services, remote access, and ensuring that resources are available to users across the globe while necessitating robust security measures to mitigate exposure risks.

For more information, view this lecture on IP addresses, MAC addresses, and port numbers- Part 3.. Or visit this Wikipedia page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define:

Public Switched Telephone Network

(PSTN)

A

The global network of telephone lines, cellular networks, and satellites that support voice and data transmission.

A network of telephone lines, switches, and other equipment that is used to transmit voice and data over long distances. It is used in traditional telephone systems and internet telephony. Examples include landlines and cellular networks.

For more information, view this lecture on Secure Communications - Part 1. Or visit this Wikipedia page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define:

PVC

(Permanent Virtual Circuit)

A

A permanently established virtual connection that provides a constant communication pathway.

A Permanent Virtual Circuit (PVC) is a fixed network connection established in technologies like ATM or frame relay, providing a dedicated channel for data transmission. PVCs remain active continuously, ensuring a consistent and reliable link for communication. This stability benefits environments requiring predictable performance, though it offers less flexibility compared to on-demand circuit configurations.

For more information, view this lecture on WAN protocols.. Or visit this Wikipedia page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define:

Quality of Service

(QoS)

A

The overall performance of a network or internet service, ensuring efficient and reliable data transmission.

The performance level of a network or internet connection that determines the speed and reliability of data transmission. It is used in networking and telecommunications to ensure that data is transmitted smoothly and efficiently. Examples include prioritizing certain types of data traffic, such as video streaming or voice calls, and implementing bandwidth allocation mechanisms to prevent network congestion.

For more information, view this lecture on Networking basics and definitions.. Or visit this Wikipedia page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define:

Queue

A

A data structure that serves and retrieves data in a first-come-first-served basis, maintaining order in data processing.

A data structure that allows for the storage and retrieval of items in a specific order. It is used in the field of computer science to manage the flow of data and ensure efficient processing. Examples include the use of queues in operating systems to manage the execution of tasks, the use of queues in networks to manage the flow of packets, and the use of queues in databases to manage the flow of queries.

Or visit this Wikipedia page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Define:

Registered Ports

A

Ports ranging from 1024 to 49151, designated for specific services and applications by the Internet Assigned Numbers Authority (IANA).

The range of port numbers that are reserved for well-known services, such as HTTP (port 80) and HTTPS (port 443). They are used in networking to identify the type of service running on a particular port. Examples include port 25 for SMTP, port 53 for DNS, and port 3389 for RDP.

For more information, view this lecture on IP addresses, MAC addresses, and port numbers- Part 1.. Or visit this Wikipedia page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Define:

Remote Access

A

The ability to access and use a computer or network from a remote location, via technologies such as VPNs or remote desktop software.

The capability of accessing a computer or a network from a distant location. This can be achieved through various technologies like Virtual Private Networks (VPN), remote desktop software, or other secure access tools. Remote access enables users to access files, data, and applications on the remote system as if they were physically present at that location, providing flexibility and enabling collaboration.

For more information, view this lecture on Networking basics and definitions.. Or visit this Wikipedia page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define:

Remote Authentication Dial-In User Service

(RADIUS)

A

A protocol that provides centralized authentication and authorization for users connecting to a network.

A networking protocol that provides centralized authentication, authorization, and account management for users who connect and use a network service. With RADIUS, rather than managing user authentication at each network access server, it’s managed from a central server. This enhances security and simplifies administration as changes like adding a user or modifying a password only need to be made one time at the central server.

For more information, view this lecture on Authentication protocols - Part 1. Or visit this Wikipedia page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Define:

Remote Browser Isolation

(RBI)

A

RBI isolates web browsing activities away from user devices, typically on a cloud or remote server, preventing malicious code from ever reaching endpoints.

By rendering webpages in a secure container, RBI sends only sanitized visuals or interactive streams back to the user. Even if a site contains exploits or drive-by downloads, they remain within the isolation environment. This dramatically reduces risk from malicious links and email attachments. RBI is especially beneficial for high-risk browsing or privileges. Implementation can integrate with corporate gateways, reducing endpoint exposures and optimizing threat containment.

Or visit this Wikipedia page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Define:

Remote Desktop Protocol

(RDP)

A

A protocol developed by Microsoft that provides a user with a graphical interface to connect to another computer over a network connection.

A protocol used to remotely connect and control a computer or network. It is commonly used for remote access to work on computers or remote administration of networks. Examples include accessing a work computer from home, remotely troubleshooting a network issue, or remotely managing servers in a data center.

For more information, view this lecture on IP addresses, MAC addresses, and port numbers- Part 1.. Or visit this Wikipedia page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Define:

Remote Job Entry

(RJE)

A

An older technology allowing jobs to be submitted to a remote mainframe or batch server for processing.

Traditionally used in mainframe and batch processing environments, RJE allows users to submit jobs to remote systems for execution. Although less common today due to advancements in computing, the concept lives on in distributed computing and cloud services.

Or visit this Wikipedia page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Define:

Remote Procedure Call

(RPC)

A

A protocol enabling a program to request services from software on another computer within a network.

A protocol that one program can use to request a service from a program located on another computer on a network. RPC uses the client-server model, where the requesting program is a client, and the service-providing program is the server. It allows inter-process communication and is designed to streamline the development of network-based applications.

Or visit this Wikipedia page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Define:

Repeaters

A

Devices that receive and amplify signals in a network to extend communication distances and improve signal quality.

A network device used to regenerate or replicate a signal. Repeaters are used in communication networks to extend the reach of a signal, overcome attenuation, or improve signal quality. They operate at the physical layer of the OSI model, receiving a signal, regenerating it, and then retransmitting it, thereby extending the physical limits or range of coverage of a network.

For more information, view this lecture on Layer 1 to 3 networking devices.. Or visit this Wikipedia page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
# Define: REST | (Representational State Transfer)
A web services design style promoting statelessness, scalability, and performance. ## Footnote An architectural style for designing networked applications. It uses a stateless, client-server communication model, where each message contains all the information necessary to understand and process the request. REST is often used in web services development due to its simplicity, scalability, and performance. The principles of REST encourage the use of HTTP methods, URIs, stateless communication, and cacheable data, among other things, to build efficient and user-friendly web services. *For more information, visit this [Wikipedia page](https://en.wikipedia.org/wiki/Representational_state_transfer).*
26
# Define: Reverse DNS
A process for translating an IP address back into a domain name to verify domain relationships and prevent spoofing. ## Footnote A process of resolving an IP address back to a domain name. Unlike the standard (forward) DNS lookup which translates a domain name into an IP address, rDNS does the opposite. This can be used as a simple form of verification, as it can be slightly more difficult for a malicious party to ensure a proper rDNS configuration compared to spoofing DNS responses. *For more information, view this lecture on [IP support protocols - Part 1.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177457-ip-support-protocols-part-1). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Reverse_DNS_lookup).*
27
# Define: Ring Topology
A network configuration where devices are connected in a circular arrangement, allowing for data transmission in a looped path. ## Footnote A network configuration where devices are connected in a circular arrangement, with each device connected to two other devices. It is used in networking to provide a dedicated path for data transmission between devices. Examples include a ring network in a small office or a token ring network in a larger organization. *For more information, view this lecture on [LAN topologies.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177530-lan-topologies). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Ring_network).*
28
# Define: RJ45 Cables
Cables used for network connections based on the Ethernet standard. ## Footnote RJ45 cables are standardized twisted-pair cables predominantly used in Ethernet networks for data transmission. Featuring eight wires arranged in specific sequences, these cables enable high-speed communication between computers, routers, and other networking devices. They form a fundamental component of wired network setups, providing reliable connectivity in both commercial and residential environments. *For more information, view this lecture on [Cable types.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177465-cable-types). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Registered_jack#Types).*
29
# Define: Rogue Wireless Access Point
An unauthorized access point installed on a network, presenting a security risk due to potential unauthorized access. ## Footnote A wireless access point that has been installed on a secure network without explicit authorization from a local network administrator. This can present a security risk as it provides an open door for attackers to enter the network undetected, potentially leading to unauthorized access to sensitive data or disruptive activities. *For more information, view this lecture on [WiFi - Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19178193-wifi-part-1). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Rogue_access_point).*
30
# Define: Route Poisoning
A method that marks a failed route as unreachable to prevent traffic misrouting. ## Footnote Route Poisoning involves advertising a route with an infinite cost or metric to render it unusable, effectively removing it from routing tables. This technique quickly isolates failed or unstable network paths, preventing data packets from being misrouted. By poisoning a route, network protocols can swiftly converge on more reliable paths, enhancing overall network stability and reducing the risk of routing loops. *For more information, view this lecture on [Layer 3 routing protocols.](https://courses.thorteaches.com/courses/take/cissp/lessons/19178251-layer-3-routing-protocols). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Route_poisoning).*
31
# Define: Routed Protocols
Network protocols that navigate the best path for data, like the Internet Protocol (IP). ## Footnote Network protocols that have the capacity to determine the most optimal path for data transmission across networks. These protocols use logical addressing and can operate independently of the underlying physical network, moving data across multiple networks, or hops, from source to destination. Common examples include Internet Protocol (IP) and Internetwork Packet Exchange (IPX). *For more information, view this lecture on [Layer 1 to 3 networking devices.](https://courses.thorteaches.com/courses/take/cissp/lessons/19178219-layer-1-to-3-networking-devices). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Routing_protocol).*
32
# Define: Router
A device that directs data packets between different networks, facilitating communication and connection. ## Footnote A networking device that connects multiple networks and forwards data packets between them. It is used to connect different devices and networks, allowing them to communicate with each other. Examples include a home router that connects a local network to the internet or a corporate router that connects multiple office locations. *For more information, view this lecture on [Layer 1 to 3 networking devices.](https://courses.thorteaches.com/courses/take/cissp/lessons/19178219-layer-1-to-3-networking-devices). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Router_(computing)).*
33
# Define: Routing Information Base | (RIB)
A data table in a router listing routes to network destinations, crucial for directing traffic. ## Footnote A data table stored in a router or a networked computer that lists the routes to particular network destinations. The RIB contains information about the topology of the network immediately around the router, including the cost (such as path length) associated with reaching each network destination. A router uses this information to determine the best path for forwarding packets. The RIB is built using information from routing protocols (like BGP, OSPF, etc.), and it may contain multiple potential paths to a destination. Routing decisions are made by a router by consulting the RIB and selecting the optimal route from the available entries based on the routing algorithm it uses. *For more information, view this lecture on [Layer 1 to 3 networking devices.](https://courses.thorteaches.com/courses/take/cissp/lessons/19178219-layer-1-to-3-networking-devices). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Routing_table).*
34
# Define: Routing Information Protocol | (RIP)
A protocol using hop count to route data; its simplicity suits smaller networks. ## Footnote A distance-vector routing protocol used for smaller networks, which uses hop count as a routing metric. RIP limits the maximum number of hops to 15, beyond which the network is considered unreachable, and updates routing tables periodically, trading off between network load and routing accuracy. *For more information, view this lecture on [Layer 3 routing protocols.](https://courses.thorteaches.com/courses/take/cissp/lessons/19178251-layer-3-routing-protocols). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Routing_Information_Protocol).*
35
# Define: Routing Loop
A network error where data packets circulate endlessly due to misconfigured routing. ## Footnote A Routing Loop occurs when incorrect or conflicting routing information causes packets to cycle continuously between routers without reaching their destination. This failure in routing protocols leads to network congestion, increased latency, and potential downtime. Identifying and eliminating routing loops is essential for maintaining efficient data flows and ensuring the overall stability and reliability of network communications. *For more information, view this lecture on [IP addresses, MAC addresses, and port numbers- Part 3.](https://courses.thorteaches.com/courses/take/cissp/lessons/22874065-ip-addresses-mac-addresses-and-port-numbers-part-3). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Routing_loop).*
36
# Define: Routing Table
A data structure in routers that lists paths to various network destinations. ## Footnote A Routing Table is a critical component of network devices, containing information about available routes, destination addresses, and associated metrics. It guides the forwarding of data packets by determining the most efficient paths across interconnected networks. Regular updates, whether through static or dynamic routing protocols, ensure that the routing table remains accurate, optimizing network performance and reliability. *For more information, view this lecture on [Layer 1 to 3 networking devices.](https://courses.thorteaches.com/courses/take/cissp/lessons/19178219-layer-1-to-3-networking-devices). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Routing_table).*
37
# Define: Satellite
An artificial object in orbit used for communication, observation, and navigation. ## Footnote A Satellite is a man-made object launched into space that orbits the Earth to provide services such as telecommunications, weather forecasting, and navigation. It serves as a relay station, transmitting signals between ground stations and remote areas. The deployment of satellites has revolutionized global communications and remote sensing by bridging vast geographic distances and enabling real-time data exchange on a worldwide scale. *For more information, view this lecture on [Wireless Networks](https://courses.thorteaches.com/courses/take/cissp/lessons/29462523-wireless-networks). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Satellite).*
38
# Define: Screen Scraping
Extracting data from the output on a screen, potentially leading to privacy concerns if misused. ## Footnote A technique used to extract data from the display output of a program or system. It involves capturing bitmap data from the screen and converting it into readable text or structured data. While screen scraping can be legitimately used for tasks such as data aggregation, web indexing, or legacy system integration, it can also be employed in malicious activities, such as harvesting sensitive data for unauthorized use. *For more information, view this lecture on [Secure Communications - Part 2](https://courses.thorteaches.com/courses/take/cissp/lessons/29462724-secure-communications-part-2). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Screen_scraping).*
39
# Define: Screened Host
A network host protected by a screening device, such as a firewall or router, enhancing security. ## Footnote A host that is protected from external threats by a screening router. It is used to prevent unauthorized access to a network and to protect sensitive information from being compromised. Examples include a server that is behind a screening router, a database that is behind a screening router, and a web application that is behind a screening router. *For more information, view this lecture on [Firewalls Part 2](https://courses.thorteaches.com/courses/take/cissp/lessons/33182521-firewalls-part-2). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Demilitarized_zone_(computing)#Single_firewall_(screened_host)).*
40
# Define: Screened Subnet Architecture
A security setup incorporating demilitarized zones (DMZs) to separate public internet servers from an internal network. ## Footnote A network configuration that uses firewalls to create a "demilitarized zone" (DMZ), a separate subnet for public-facing servers. In this setup, one firewall sits between the internal network and the DMZ, and another firewall sits between the DMZ and the external network (e.g., the internet). This configuration allows public traffic to access servers in the DMZ while maintaining a protective barrier between the external network and the internal network, thereby enhancing the security of the internal network. *For more information, view this lecture on [Firewalls Part 2](https://courses.thorteaches.com/courses/take/cissp/lessons/33182521-firewalls-part-2). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Demilitarized_zone_(computing)#Dual_firewall_(screened_subnet)).*
41
# Define: Screening Routers
Devices that manage and restrict network traffic at the edge of a network to heighten security. ## Footnote Network devices that filter packets to control access and manage traffic between different parts of a network. They are configured with specific rules to block or allow traffic based on factors such as source and destination IP addresses, ports, or protocols. The goal of a screening router is to enhance network security by preventing unauthorized access or traffic, mitigating the risk of network attacks, and managing network load. *For more information, view this lecture on [Firewalls Part 2](https://courses.thorteaches.com/courses/take/cissp/lessons/33182521-firewalls-part-2).*
42
# Define: SD-WAN | (Software Defined Wide Area Network)
A WAN technology that uses software-based controls for dynamic network management. ## Footnote SD-WAN utilizes software-defined networking principles to manage wide-area networks more efficiently. By abstracting network control from the hardware, it dynamically routes traffic across multiple connections to optimize performance, reduce costs, and improve network reliability, particularly in distributed and cloud-based environments. *For more information, view this lecture on [Secure Access Service Edge](https://courses.thorteaches.com/courses/take/cissp/lessons/54398562-new-2024-sase-secure-access-service-edge). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/SD-WAN).*
43
# Define: SD-WAN Security
SD-WAN Security protects software-defined wide-area networks by integrating encryption, segmentation, and threat detection, ensuring safe data transmission across geographically dispersed sites. ## Footnote Traditional WANs often rely on MPLS connections and hardware-centric configurations. SD-WAN uses software policies to dynamically route traffic over multiple transport types—like broadband, LTE, or MPLS. Security solutions for SD-WAN may include built-in firewalls, zero-touch provisioning, and real-time monitoring. These capabilities allow organizations to optimize performance while maintaining robust protection. SD-WAN Security streamlines management, lowers network costs, and provides consistent policy enforcement across branch offices and cloud services. *For more information, visit this [Wikipedia page](https://en.wikipedia.org/wiki/SD-WAN#Security).*
44
# Define: Secure Access Service Edge | (SASE)
SASE converges network and security functions, such as SD-WAN, secure web gateways, and zero trust network access, into a cloud-delivered framework for consistent, location-independent protection. ## Footnote Coined by Gartner, SASE replaces traditional hardware-centric approaches with a unified edge platform, enabling remote workers or branch offices to securely connect without backhauling traffic to data centers. Core SASE components include CASB, firewall-as-a-service, and zero-day threat prevention. This architecture centralizes policy configuration and enforcement, enhancing visibility and reducing complexity. Organizations adopt SASE to improve performance, scalability, and user experience while minimizing security risks. *For more information, view this lecture on [Secure Access Service Edge](https://courses.thorteaches.com/courses/take/cissp/lessons/54398562-new-2024-sase-secure-access-service-edge). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Secure_access_service_edge).*
45
# Define: Secure Communications
The usage of cryptographic techniques to protect the exchange of information between parties from eavesdropping or tampering. ## Footnote The use of cryptographic techniques to protect the confidentiality, integrity, and authenticity of communication between two or more parties. It is used to prevent unauthorized access to sensitive information and to protect against man-in-the-middle attacks. Examples include using encryption to protect the contents of an email, using digital signatures to verify the authenticity of a message, and using secure protocols to establish a secure channel between two parties. *For more information, view this lecture on [Introduction to Cryptography- Part 2.](https://courses.thorteaches.com/courses/take/cissp/lessons/19121869-introduction-to-cryptography-part-1). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Secure_communication).*
46
# Define: Secure FTP | (SFTP)
A protocol for securely transferring files over a network using encryption to protect data integrity and confidentiality. ## Footnote A secure protocol for transferring files over a network. It is used to protect the confidentiality and integrity of the transferred files and to prevent unauthorized access to sensitive information. Examples include using SFTP to transfer sensitive documents between two parties, using SFTP to transfer financial data between a client and a server, and using SFTP to transfer software updates to a network of devices. *For more information, view this lecture on [IP support protocols - Part 1.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177457-ip-support-protocols-part-1). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/SSH_File_Transfer_Protocol).*
47
# Define: Secure Hypertext Transfer Protocol | (S-HTTP)
An extension of HTTP to support secure data exchange, largely replaced by the more prevalent HTTPS. ## Footnote S-HTTP was an extension of HTTP to support the secure exchange of data over the internet. However, it has not been widely adopted, and its use has been largely superseded by HTTPS, which combines HTTP with the SSL/TLS protocol to provide a secure browsing experience. *For more information, view this lecture on [IP Addresses, MAC Addresses, and Port Numbers- Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19177398-ip-addresses-mac-addresses-and-port-numbers-part-1). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/S-HTTP).*
48
# Define: Secure Shell | (SSH)
A network protocol allowing secure remote access and other services over unsecured networks via encrypted communication. ## Footnote A network protocol that enables secure remote login and other secure network services over an unsecured network. SSH provides robust authentication and secure encrypted data communication between two computers connecting over an open network, ensuring the confidentiality and integrity of data transmitted. It is widely used by network administrators for remotely controlling servers and applications. *For more information, view this lecture on [IP Addresses, MAC Addresses, and Port Numbers- Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19177398-ip-addresses-mac-addresses-and-port-numbers-part-1) or [IP Support Protocols - Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19177457-ip-support-protocols-part-1). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Secure_Shell).*
49
# Define: Secure/Multipurpose Internet Mail Extensions | (S/MIME)
A protocol for sending digitally signed and encrypted email messages to ensure secure communication. ## Footnote S/MIME is a protocol for sending digitally signed and encrypted messages. It ensures the confidentiality of email content, authenticates the sender, confirms message integrity, and prevents message tampering in transit, which is essential for secure communication. *For more information, view this lecture on [IPSec and PGP](https://courses.thorteaches.com/courses/take/cissp/lessons/19149746-ipsec-and-pgp). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/S/MIME).*
50
# Define: Securing Network Components
The practice of implementing security measures on network components to protect against unauthorized access and cyber threats. ## Footnote The practice of implementing security measures on network components, such as routers, firewalls, and servers, to protect against unauthorized access and attacks. This is used to protect the confidentiality, integrity, and availability of networked systems and data. For example, a router may be configured with a firewall to block malicious traffic or a server may be configured with access controls to prevent unauthorized access.
51
# Define: Security Association Management
Managing the agreements and parameters for establishing secure communication channels in network communications. ## Footnote The process of managing the negotiations and agreements required to establish, maintain, and delete security associations (SAs) in network communication protocols such as IPSec. These associations ensure the secure exchange of data over a network. *Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Internet_Security_Association_and_Key_Management_Protocol).*
52
# Define: Security Associations | (SAS)
Agreements outlining the parameters for secure communications between network entities, such as in IPSec. ## Footnote The crucial relationships between two or more entities that outline how they will utilize security services to ensure secure communication. An SA encapsulates all necessary parameters like encryption algorithms, cryptographic keys, and authentication techniques, offering a defined pathway for the secure exchange of data. SAs are widely used in protocol suites like Internet Protocol Security (IPSec) to maintain the integrity and confidentiality of communications. *For more information, view this lecture on [IPSec and PGP](https://courses.thorteaches.com/courses/take/cissp/lessons/19149746-ipsec-and-pgp) or [Secure Communications - Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19178318-secure-communications-part-1). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Internet_Security_Association_and_Key_Management_Protocol).*
53
# Define: Security Parameter Index
An identifier mapping security associations within IPsec protocols. ## Footnote The Security Parameter Index (SPI) is a unique numeric identifier used in IPsec to associate specific security parameters with their corresponding data streams. It ensures that incoming packets are processed using the correct cryptographic algorithms and keys by linking them to the proper security association. Effective use of the SPI is critical in maintaining secure communication channels across untrusted networks. *For more information, view this lecture on [IPSec and PGP](https://courses.thorteaches.com/courses/take/cissp/lessons/19149746-ipsec-and-pgp). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/IPsec).*
54
# Define: Security Zone
A part of a network with specific security policies, segregating different types of data or trust levels. ## Footnote A portion of a network that has specific security policies enforced. This division can be physical or virtual and is used to segregate different types of data, systems, or resources based on their sensitivity or the level of trust. For example, a company might have a zone for more secure data, such as financial or customer information, which is separated from less secure zones containing non-sensitive data.
55
# Define: Serial Line Internet Protocol | (SLIP)
An old protocol for transmitting IP packets over serial lines, now largely replaced by PPP. ## Footnote An older, simple protocol used for transmitting Internet Protocol (IP) packets over serial connections, typically telephone lines. It was widely used for dial-up internet access before the more advanced Point-to-Point Protocol (PPP) became prevalent. SLIP lacks many features found in newer protocols, such as error detection and compression, but its simplicity made it easy to implement in scenarios where higher-performance alternatives were not needed. *For more information, view this lecture on [Network Authentication Protocols](https://courses.thorteaches.com/courses/take/cissp/lessons/19178311-network-authentication-protocols). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Serial_Line_Internet_Protocol).*
56
# Define: Service Set Identifier | (SSID)
A unique identifier assigned to a wireless network for devices to establish a connection. ## Footnote A unique identifier assigned to a wireless local area network (WLAN). Essentially, it is the network name that wireless devices use to establish and maintain a connection. The SSID is broadcast by a wireless access point (such as a router) and detected by wireless devices seeking to join the network. Implementing appropriate SSID settings, such as disabling SSID broadcasting or changing the default SSID, can help enhance the security of a wireless network. *For more information, view this lecture on [WiFi - Part 2](https://courses.thorteaches.com/courses/take/cissp/lessons/29948642-wifi-part-2). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Service_set_(802.11_network)).*
57
# Define: Service Set Identifier (SSID) Broadcast
The public transmission of a network name by a wireless access point to enable device connection discovery. ## Footnote The transmission of the SSID by a wireless access point to allow devices to discover and connect to the network. It is used in wireless networking to make it easier for devices to connect to the network. Examples include enabling SSID broadcast on a home router and disabling SSID broadcast on a public hotspot for security purposes. *For more information, view this lecture on [WiFi - Part 2](https://courses.thorteaches.com/courses/take/cissp/lessons/29948642-wifi-part-2). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Service_set_(802.11_network)#SSID).*
58
# Define: SESAME | (Secure European System For Applications In A Multi-Vendor Environment)
A European framework ensuring secure interactions in multi-vendor IT environments. ## Footnote SESAME is a security framework developed to create a unified set of protocols and policies for secure communications and applications across vendors in Europe. It aims to facilitate interoperability and robust security measures in environments where diverse systems coexist. By establishing standardized practices, SESAME helps safeguard sensitive data, promote trust, and streamline multi-vendor collaborations. *For more information, view this lecture on [Authentication Protocols - Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19179828-authentication-protocols-part-1).*
59
# Define: Session
Related interactions within a system between a user and the computer, managed for security and continuity. ## Footnote A sequence of related interactions between a user and a computer system. It is used to track and manage user activity within a network or application. For example, a user may start a session when logging into a website, and the session will end when the user logs out or the session times out. *For more information, view this lecture on [The OSI Model- Part 2](https://courses.thorteaches.com/courses/take/cissp/lessons/22712043-the-osi-model-part-2). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Session_(computer_science)).*
60
# Define: Session Layer
The OSI model layer responsible for establishing and managing communication sessions. ## Footnote The 5th layer of the OSI model is responsible for establishing, managing, and terminating connections between applications. Functions such as authentication, authorization, session restoration, and synchronization of data exchange are handled at this layer. By managing these session-based communications, the session layer enables coordinated data exchange between systems or applications. *For more information, view this lecture on [The OSI Model- Part 2](https://courses.thorteaches.com/courses/take/cissp/lessons/22712043-the-osi-model-part-2). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Session_layer).*
61
# Define: Shielded Twisted Pair | (STP)
Cabling with shielding around wires to prevent interference and enhance network security. ## Footnote A type of cable used in networking that has a protective layer around each individual wire to prevent external interference. It is commonly used in Ethernet cables and other network connectivity devices. Examples include STP cables used to connect a computer to a router, STP cables used to connect a printer to a network, and STP cables used in security cameras. *For more information, view this lecture on [Cable Types](https://courses.thorteaches.com/courses/take/cissp/lessons/19177465-cable-types). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Twisted_pair#Shielded_twisted_pair_(STP)).*
62
# Define: Signal Jamming
Disrupting wireless signals to interfere with communications or prevent signal transmission. ## Footnote A technique used to disrupt or block wireless signals, such as radio or wireless internet signals. It is often used in electronic warfare, and jamming devices can be used to disrupt GPS, cellular, and other wireless communications. For instance, an attacker may use signal jamming to disrupt communications during a military operation or to prevent a victim from using their phone to call for help. *For more information, view this lecture on [WiFi - Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19178193-wifi-part-1). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Radio_jamming).*
63
# Define: Simple Mail Transfer Protocol | (SMTP)
The standard protocol for email transmission across the internet, used by servers to send messages. ## Footnote The standard protocol to send emails across networks, SMTP is utilized by email servers to relay outgoing mails to the correct recipients' servers. Although it does not encrypt messages, SMTP ensures emails reach their destination but is frequently complemented by additional security measures for secure transmission. *For more information, view this lecture on [IP addresses, MAC addresses, and port numbers- Part 1.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177398-ip-addresses-mac-addresses-and-port-numbers-part-1). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Simple_Mail_Transfer_Protocol).*
64
# Define: Simple Network Management Protocol | (SNMP)
A protocol for managing and monitoring network devices, providing insights into network performance and issues. ## Footnote A protocol used for managing and monitoring devices on a network, such as servers, routers, switches, printers, and more. It enables administrators to monitor network performance, find and solve network issues, and plan for network growth. SNMP works by sending messages, known as protocol data units (PDUs), to different parts of a network. Responses are returned with the required information, allowing administrators to take appropriate actions if needed. *For more information, view this lecture on [IP support protocols - Part 2.](https://courses.thorteaches.com/courses/take/cissp/lessons/23142530-ip-support-protocols-part-2). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Simple_Network_Management_Protocol).*
65
# Define: Simple Object Access Protocol | (SOAP)
A protocol used for exchanging structured information and implementing web services over a network. ## Footnote A protocol for exchanging structured information in the implementation of web services in computer networks. SOAP uses XML to encode messages and relies on other application layer protocols, most notably HTTP and SMTP, for message transmission. Although SOAP can be used in a stateful way, it is fundamentally stateless like REST. *For more information, visit this [Wikipedia page](https://en.wikipedia.org/wiki/SOAP).*
66
# Define: Simplex Mode
A communication mode where data transmission is one-way, typically used in scenarios like broadcast radio. ## Footnote A mode of operation where only one-way communication is possible. It is often used in radio and other forms of wireless communication, where only one device can transmit at a time. For example, in a simplex mode radio system, only one device can transmit at a time, and the other devices must listen and wait their turn to transmit. *For more information, view this lecture on [IPSec and PGP.](https://courses.thorteaches.com/courses/take/cissp/lessons/19149746-ipsec-and-pgp) or [Secure Communications - Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19178318-secure-communications-part-1) or [Networking basics and definitions.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177258-networking-basics-and-definitions). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Simplex_communication).*
67
# Define: Smart Devices
Devices integrated with computing power, connectivity, and sensors for intelligent operation. ## Footnote Smart devices are electronic products equipped with processing capabilities, network connectivity, and sensors, enabling them to perform advanced functions autonomously. They are integral to the Internet of Things (IoT), allowing seamless data exchange, automated responses, and enhanced interactivity in applications ranging from home automation to wearable technology. *For more information, view this lecture on [IOT (Internet Of Things).](https://courses.thorteaches.com/courses/take/cissp/lessons/18591385-iot-internet-of-things). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Smart_device).*
68
# Define: SMS | (Short Message Service)
SMS is a widely used text messaging protocol allowing mobile phone users to send up to 160-character messages, utilized for personal and business communications. ## Footnote Despite advanced messaging apps, SMS remains popular for notifications, two-factor codes, and marketing campaigns. While convenient, SMS is vulnerable to interception and SIM swapping, posing security risks. Privacy concerns persist, as carriers and rogue actors might access stored messages. Employing encryption apps or alternative channels offers stronger data protection for sensitive conversations. *For more information, visit this [Wikipedia page](https://en.wikipedia.org/wiki/Short_Message_Service).*
69
# Define: SMTP Relay
The process of transferring an email from one server to another through the SMTP protocol necessary for message delivery. ## Footnote The process of transferring an email from one mail server to another. In this context, the term "relay" describes the act of passing along the email. SMTP (Simple Mail Transfer Protocol) is the protocol used for sending email across the internet. While SMTP relays are essential for email delivery, they can be exploited by spammers if not properly secured, leading to a mail server being used to send unsolicited emails. *For more information, visit this [Wikipedia page](https://en.wikipedia.org/wiki/Open_mail_relay).*
70
# Define: Smurf Attack
A network attack where ICMP packets are broadcast to overwhelm a system and cause a denial of service. ## Footnote A type of network attack where a large number of Internet Control Message Protocol (ICMP) packets are sent to a broadcast address, resulting in a flood of responses that can overwhelm a network and cause a denial of service. It is typically used by hackers to disrupt the availability of a network or website. Examples of smurf attacks include the "Code Red" worm in 2001 and the "Ping of Death" attack in 1996. *For more information, view this lecture on [The OSI model- Part 2.](https://courses.thorteaches.com/courses/take/cissp/lessons/22712043-the-osi-model-part-2). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Smurf_attack).*
71
# Define: Socket/Socket Pair
The combination of an IP address and port number that forms a communication endpoint. ## Footnote A Socket or Socket Pair represents the unique combination of an IP address and port number used to establish a connection between devices over a network. It serves as a critical endpoint for sending and receiving data, forming the basis for client-server interactions and various network communications. This mechanism ensures that data is correctly directed between multiple applications and processes on interconnected systems. *For more information, view this lecture on [IP addresses, MAC addresses, and port numbers- Part 2.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177405-ip-addresses-mac-addresses-and-port-numbers-part-2). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Network_socket).*
72
# Define: SOCKS
A network protocol enabling client-server communication via a proxy server, providing an added layer of protection. ## Footnote A protocol that facilitates the routing of network packets between clients and servers through a proxy server. This protocol establishes a TCP connection that can transmit any kind of data securely, providing a layer of protection between the user and the internet. SOCKS is used where more granular control at the application layer of the network is needed, like in cases of circumventing IP-based restrictions or maintaining anonymity online. *For more information, visit this [Wikipedia page](https://en.wikipedia.org/wiki/SOCKS).*
73
# Define: Software-Defined Networking | (SDN)
An approach that manages network services through software rather than hardware. ## Footnote A networking architecture that uses software to control and manage network infrastructure rather than relying on hardware-based controls. It is used to improve network agility, scalability, and flexibility. Examples include using software-defined networking controllers, virtualizing network functions, and implementing network automation tools. *For more information, view this lecture on [SAN and VoIP protocols.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177558-san-and-voip-protocols). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Software-defined_networking).*
74
# Define: SONET | (Synchronous Optical Network)
A standardized fiber optic protocol for high-speed, reliable digital communications. ## Footnote SONET is a high-performance transmission protocol that uses synchronous data transfer over fiber optics to deliver large volumes of digital information reliably and efficiently. It standardizes the multiplexing of voice, data, and video across long distances, ensuring interoperability among different systems. SONET's precise timing and robust error correction make it a backbone technology in telecommunications and large-scale network infrastructures. *For more information, view this lecture on [WAN protocols.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177534-wan-protocols). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/SONET).*
75
# Define: Span Port | (Mirror Port)
A network feature that copies traffic from one or more ports to another port for monitoring purposes. ## Footnote A feature on network switches that allows the duplication of network packets from one or more ports to a designated monitoring port, enabling network administrators to analyze traffic for various purposes, such as performance monitoring, troubleshooting, and security analysis. Tools like network analyzers or intrusion detection systems are often connected to a span port to observe network traffic without affecting the flow of data. *For more information, view this lecture on [IP addresses, MAC addresses, and port numbers- Part 2.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177405-ip-addresses-mac-addresses-and-port-numbers-part-2). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Port_mirroring).*
76
# Define: Spanning Tree Algorithm | (STA)
A network algorithm used to prevent loops by creating a loop-free logical topology for Ethernet networks. ## Footnote A mathematical process used in network communications to create a topology of interconnected switches or bridges that is loop-free, ensuring there are no circular paths through which packets can endlessly loop. This is critical for the stability and efficiency of network communications, as it eliminates the risk of broadcast storms and multiple frame transmissions that could lead to network failure. *For more information, visit this [Wikipedia page](https://en.wikipedia.org/wiki/Spanning_tree#Applications).*
77
# Define: Spanning Tree Protocol | (STP)
A protocol that prevents network loops by creating a loop-free topology for Ethernet networks. ## Footnote A network protocol that ensures a loop-free network by disabling redundant links and creating a tree-like network structure. It is used in local area networks (LANs) to prevent broadcast storms and network loops. Examples include using STP to create a root bridge. *For more information, visit this [Wikipedia page](https://en.wikipedia.org/wiki/Spanning_Tree_Protocol).*
78
# Define: SPF | (Sender Policy Framework)
SPF is an email validation system that checks whether a mail server is authorized to send messages on behalf of a specified domain, helping combat email spoofing. ## Footnote DNS records list permitted IP addresses authorized by the domain owner. When receiving mail, servers verify if the source IP matches the listed addresses. If mismatched, the email is flagged or rejected. Combined with DKIM and DMARC, SPF improves email integrity. Proper configuration reduces phishing attempts that exploit fraudulent sender addresses. *For more information, visit this [Wikipedia page](https://en.wikipedia.org/wiki/Sender_Policy_Framework).*
79
# Define: Spread Spectrum
A wireless communication technique that spreads the signal over a wide frequency band to reduce interference and improve security. ## Footnote A method of transmitting radio signals by spreading the signal across a wide frequency band. It is used in wireless communication to improve security and reduce interference. Examples include Bluetooth and Wi-Fi technology, which use a spread spectrum to transmit data between devices. *For more information, visit this [Wikipedia page](https://en.wikipedia.org/wiki/Spread_spectrum).*
80
# Define: SRTP | (Secure Real-Time Protocol)
SRTP is a profile of RTP that encrypts and authenticates real-time audio and video communication, enhancing confidentiality and integrity for VoIP or video conferencing. ## Footnote By adding cryptographic protections such as AES encryption and message authentication, SRTP prevents eavesdropping, replay attacks, or content tampering. Keys can be exchanged via secure protocols like SDES or DTLS. Deployed in unified communications systems, SRTP ensures calls remain private, aligning with compliance regulations. Well-implemented SRTP upholds user trust in voice and video transmissions over potentially insecure networks. *For more information, visit this [Wikipedia page](https://en.wikipedia.org/wiki/Secure_Real-time_Transport_Protocol).*
81
# Define: SSL | (Secure Sockets Layer)
A protocol providing secure communication over a network, now succeeded by TLS for improved security. ## Footnote A cryptographic protocol designed to provide secure communication over a computer network. SSL uses encryption to ensure the privacy, authentication, and data integrity in internet communications. It has been succeeded by TLS (Transport Layer Security), which continues to secure transactions on the World Wide Web. *For more information, view this lecture on [MAC, HMAC, SSL, and TLS.](https://courses.thorteaches.com/courses/take/cissp/lessons/19149773-mac-hmac-ssl-and-tls). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Transport_Layer_Security).*
82
# Define: SSL/TLS | (Secure Sockets Layer/Transport Layer Security)
Protocols ensuring secure communication over computer networks, with TLS being the updated version of SSL. ## Footnote Cryptographic protocols that provide secure communications over a computer network. SSL is the older version, while TLS is the newer protocol offering enhanced security. Both are widely used for secure transactions and data transmission on the internet. *For more information, view this lecture on [MAC, HMAC, SSL, and TLS.](https://courses.thorteaches.com/courses/take/cissp/lessons/19149773-mac-hmac-ssl-and-tls) or [Secure Communications - Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19178318-secure-communications-part-1). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Transport_Layer_Security).*
83
# Define: Star Topology
A network setup where all nodes are connected to a central hub, facilitating data transfer and system management. ## Footnote A network topology in which all devices are connected to a central device, such as a hub or switch. It is commonly used in small to medium-sized networks. Examples include a home network with a router as the central device or a small office network with a switch as the central device. *For more information, view this lecture on [LAN topologies.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177530-lan-topologies) or [Access control systems.](https://courses.thorteaches.com/courses/take/cissp/lessons/19179400-access-control-systems). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Star_network).*
84
# Define: Stateful Inspection
A security system's capability to monitor and maintain the state of network connections to validate incoming traffic. ## Footnote The capability of a security system to track and monitor the state of network connections traveling across it. In this context, "state" indicates the conditions of a connection at any point in its lifetime, encompassing aspects such as IP addresses, port numbers, and the sequencing information of packets. It can be used to ensure that incoming packets are legitimate responses to outgoing requests, hence providing a strong defense against unauthorized traffic. *For more information, view this lecture on [Firewalls Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19178275-firewalls-part-1).*
85
# Define: Stateful Inspection Firewall
A firewall that tracks active connections and makes context-based decisions to secure network traffic. ## Footnote A type of firewall that monitors the state of active connections and makes decisions based on the context of the traffic. It allows or blocks traffic by understanding and remembering the state of network sessions, enhancing security by ensuring only legitimate and expected traffic is allowed. *For more information, view this lecture on [Firewalls Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19178275-firewalls-part-1). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Stateful_firewall).*
86
# Define: Stateful Packet Filtering
A network security method where a firewall maintains information on packet states to regulate traffic. ## Footnote A method of network security in which the firewall maintains information about the state of packets in a network and uses this information to determine whether or not to allow traffic through. It is commonly used in enterprise-level network security. Examples include a stateful packet filtering firewall that tracks the state of packets in a network or a stateful packet filtering router that tracks the state of packets in a network. *For more information, view this lecture on [Firewalls Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19178275-firewalls-part-1). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Stateful_firewall).*
87
# Define: Stateless Packet Inspection
A security approach that evaluates network packets individually without considering the connection state. ## Footnote A type of packet filtering that evaluates network packets without maintaining the context or state of the connection. Each packet is inspected in isolation, based on predefined rules, which might include source and destination IP addresses, protocol, and port numbers. *For more information, view this lecture on [Firewalls Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19178275-firewalls-part-1). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Firewall_(computing)#Stateless_firewalls).*
88
# Define: Static Packet Filtering
A firewall technique that applies static rules to manage network traffic based on packet attributes. ## Footnote A firewall security method that controls network traffic by applying a set of static rules to each incoming or outgoing packet. Unlike stateful inspection, it does not track the state of connections and makes decisions based solely on the attributes of individual packets, such as IP addresses and port numbers. *For more information, view this lecture on [Firewalls Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19178275-firewalls-part-1). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Packet_filtering).*
89
# Define: Static Route
A manually configured routing entry that remains fixed unless changed by an administrator. ## Footnote A Static Route is a routing pathway explicitly set by a network administrator, providing a fixed route for data packets irrespective of network conditions. Unlike dynamically learned routes, static routes require no automatic adjustments, making them ideal for predictable network paths in stable environments. However, changes in network topology necessitate manual updates, limiting flexibility in dynamic networks. *For more information, view this lecture on [Layer 1 to 3 Networking Devices](https://courses.thorteaches.com/courses/take/cissp/lessons/19178219-layer-1-to-3-networking-devices). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Static_routing).*
90
# Define: Storage Area Network | (SAN)
A dedicated high-speed network providing access to consolidated block-level storage, enhancing data management. ## Footnote A high-speed, specialized network that provides block-level network access to storage. It is typically used in data centers to enhance storage devices' functionality by making them appear as locally attached devices to the operating system of a server. SANs aid in improving application availability, enhancing performance, and facilitating disaster recovery processes. *For more information, view this lecture on [SAN and VoIP Protocols](https://courses.thorteaches.com/courses/take/cissp/lessons/19177558-san-and-voip-protocols). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Storage_area_network).*
91
# Define: Subnet
A smaller, logical partition of a larger network, often used to optimize performance and security. ## Footnote A smaller network within a larger network that is used to divide a network into smaller, more efficient sections. It is used in network engineering and computer science to improve network performance and security. Examples include a subnet for a company's internal network, a subnet for a home network, and a subnet for a public Wi-Fi hotspot. *For more information, view this lecture on [IP Addresses, MAC Addresses, and Port Numbers- Part 3](https://courses.thorteaches.com/courses/take/cissp/lessons/22874065-ip-addresses-mac-addresses-and-port-numbers-part-3). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Subnet).*
92
# Define: SVC | (Switched Virtual Circuit)
A temporary, dynamically established virtual connection used for data transmission. ## Footnote A Switched Virtual Circuit (SVC) is a network connection that is established on demand and dismantled after data transmission is complete. Used in various packet-switched networks, SVCs provide the flexibility to allocate network resources only when needed, optimizing bandwidth usage. They support dynamic communication needs while offering secure and efficient temporary pathways between network endpoints. *For more information, view this lecture on [WAN Protocols](https://courses.thorteaches.com/courses/take/cissp/lessons/19177534-wan-protocols). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Switched_virtual_circuit).*
93
# Define: SWGS | (Secure Web Gateways)
SWGs are security solutions that filter web traffic, blocking malicious content, enforcing access policies, and protecting devices from internet-borne threats. ## Footnote Deployed as hardware appliances or cloud services, SWGs inspect URLs, embedded code, and file downloads for malware, phishing, or inappropriate content. They integrate with corporate policies to control employee browsing, preventing data leaks or advanced attacks. Combining antivirus scanning, URL filtering, and decryption capabilities, SWGs safeguard users from evolving online risks. They remain integral to comprehensive web security strategies.
94
# Define: Switch
A network device connecting multiple devices, controlling data flow, and improving network efficiency and security. ## Footnote A networking device that connects multiple devices on a computer network by using packet switching to receive, process, and forward data to the destination device. Unlike a network hub, which broadcasts the same data to all its ports, a switch delivers data only to the device for which it was intended, improving network efficiency and security. The ability to isolate traffic to specific devices makes a switch an essential component in many network infrastructures. *For more information, view this lecture on [Layer 1 to 3 Networking Devices](https://courses.thorteaches.com/courses/take/cissp/lessons/19178219-layer-1-to-3-networking-devices). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Network_switch).*
95
# Define: Switched Network
A network that uses technology to route data between nodes only as needed, optimizing resource use. ## Footnote A telecommunications network that uses circuit-switching, message-switching, or packet-switching technology for the purpose of transmitting data from one node to another. Instead of a continuous, dedicated path between nodes, switched networks allow the connection to be established when needed and terminated when communication ends. This creates a flexible and efficient use of resources, with each communication routed independently and given access to the full bandwidth. *For more information, view this lecture on [Layer 1 to 3 Networking Devices](https://courses.thorteaches.com/courses/take/cissp/lessons/19178219-layer-1-to-3-networking-devices). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Switched_communication_network).*
96
# Define: SYN Flood
A denial of service attack that sends numerous SYN requests to overwhelm a server and disrupt services. ## Footnote A type of denial of service (DoS) attack that overloads a server by sending numerous SYN (synchronize) packets without completing the connection process. It is commonly used to disrupt network services or take down a website. Examples include a SYN Flood attack on a web server or a SYN Flood attack on a DNS server. *For more information, view this lecture on [The OSI Model- Part 2](https://courses.thorteaches.com/courses/take/cissp/lessons/22712043-the-osi-model-part-2). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/SYN_flood).*
97
# Define: SYN Packet
A packet used in TCP/IP communication to initiate a three-way handshake and establish a network connection. ## Footnote A key component of the TCP/IP protocol's three-way handshake, the SYN packet is sent by a client to initiate a network connection. It requests the establishment of a session by signaling the start of communication. The server responds with a SYN-ACK packet, acknowledging the request, and the handshake is completed when the client replies with an ACK packet. *For more information, view this lecture on [The OSI Model- Part 2](https://courses.thorteaches.com/courses/take/cissp/lessons/22712043-the-osi-model-part-2). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Transmission_Control_Protocol#Connection_establishment).*
98
# Define: Synchronous
Events or processes occurring at regular intervals, allowing for efficient data transmission. ## Footnote The events that occur at the same time or in a predictable and consistent time sequence. In the context of data transmission, synchronous refers to the method where data is sent at regular intervals, often accompanied by a clock signal, to ensure both the sender and receiver are in synchronization. This consistent timing can improve the efficiency of data transmission but requires both systems to maintain the same pace, which can be challenging. *For more information, visit this [Wikipedia page](https://en.wikipedia.org/wiki/Synchronous_communication).*
99
# Define: TCP Sequence Number Prediction Attack
An attack exploiting predictable TCP sequence numbers to inject malicious data into a communication stream. ## Footnote A cyberattack exploiting the sequential nature of TCP packets. Attackers predict the sequence numbers used in a TCP session to inject malicious data or take over the connection. This technique can compromise the session's integrity, potentially leading to data breaches or service disruptions. *For more information, visit this [Wikipedia page](https://en.wikipedia.org/wiki/TCP_sequence_prediction_attack).*
100
# Define: TCP SYN Flood Attack
A denial-of-service attack that overloads a server with incomplete connection requests. ## Footnote A type of denial-of-service (DoS) attack that aims to make a server unavailable by overwhelming it with connection requests. The attacker sends a series of TCP SYN (synchronization) packets to the target server, each appearing to come from a different source, which prompts the server to allocate resources to await the completion of each connection. However, the attacker never completes the connections, causing the server to become overwhelmed with incomplete connections and eventually making the server unavailable to legitimate users. *For more information, view this lecture on [The OSI Model- Part 2](https://courses.thorteaches.com/courses/take/cissp/lessons/22712043-the-osi-model-part-2). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/SYN_flood).*
101
# Define: TCP/IP | (Transmission Control Protocol/Internet Protocol)
A suite of communication protocols that enable internet functionality and data exchange. ## Footnote The suite of protocols that defines how devices communicate over networks, including the internet. TCP (Transmission Control Protocol) and IP (Internet Protocol) are the two primary protocols in the suite and are responsible for establishing connections, transmitting data, and routing packets across networks. Examples include using TCP/IP to send an email, to access a website, or to share files over a network. *For more information, view this lecture on [The TCP-IP Model](https://courses.thorteaches.com/courses/take/cissp/lessons/19177306-the-tcp-ip-model). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Internet_protocol_suite).*
102
# Define: TCP/IP Hijacking
An attack where an intruder takes control of an existing TCP/IP session to manipulate or intercept communication. ## Footnote An attack where an intruder takes control of an existing TCP/IP session between two entities. The attacker exploits vulnerabilities to insert themselves into the data stream, enabling them to intercept or manipulate the communication. This form of hijacking poses significant risks to data integrity and confidentiality. *For more information, view this lecture on [Attacks on Our Cryptography- Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19149711-attacks-on-our-cryptography-part-1).*
103
# Define: Tcpdump
A powerful network monitoring and data analysis tool used for network diagnostics and security auditing. ## Footnote An open-source command-line tool used primarily on Unix and Linux-based systems for network monitoring and data analysis. It allows the user to intercept and display TCP/IP and other packets transmitted or received over a network to which the computer is attached. In terms of security, tcpdump can be used for analyzing network activity, troubleshooting network issues, and detecting network intrusion attempts or other suspicious activity. *For more information, visit this [Wikipedia page](https://en.wikipedia.org/wiki/Tcpdump).*
104
# Define: Teardrop Attack
A denial-of-service attack targeting vulnerabilities in the packet reassembly process. ## Footnote A denial-of-service attack that targets the vulnerability in the IP packet reassembly process. The attacker sends fragmented IP packets with overlapping offset field values to the target system, which can cause the system to fail or crash when it tries to reassemble these malformed fragments. This attack exploits the fragmentation logic errors in older operating systems that do not handle such exceptions properly. *For more information, visit this [Wikipedia page](https://en.wikipedia.org/wiki/Teardrop_attack).*
105
# Define: Telecommunications
The transmission of data across various channels and the protection of this data during transmission. ## Footnote This term refers to the transmission of signals, signs, messages, writings, images, sounds, or information of any nature by wire, radio, optical, or other electromagnetic systems. In cybersecurity, it encompasses the protection of data as it is transmitted across these various channels. *For more information, view this lecture on [Networking Basics and Definitions](https://courses.thorteaches.com/courses/take/cissp/lessons/19177258-networking-basics-and-definitions). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Telecommunication).*
106
# Define: Telephony
The use of technology for voice communications, enabling long-distance telephone calls and related services. ## Footnote The technology and processes used for transmitting voice communications, such as telephone calls and voicemail. It is used to enable people to communicate with each other over long distances. Examples include landline phones, mobile phones, and Voice over IP (VoIP) systems. *For more information, view this lecture on [Networking Basics and Definitions](https://courses.thorteaches.com/courses/take/cissp/lessons/19177258-networking-basics-and-definitions). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Telephony).*
107
# Define: Teleprocessing
The processing of remote communications between computer systems and devices, facilitating user interaction from a distance. ## Footnote Teleprocessing is the processing of information that supports remote communication between computer systems and related devices, allowing users to interact with a computer from a distance. It encompasses the use of telecommunications to transmit data for processing and the results back to the user.
108
# Define: Telnet
A network protocol used for remote command-line access; obsolete due to lack of encryption. ## Footnote An older network protocol for accessing remote computers, Telnet is used for command-line interfacing with servers and network devices. Due to its lack of encryption, it is now superseded by more secure protocols, such as SSH, for remote access in security-conscious environments. *For more information, view this lecture on [IP Addresses, MAC Addresses, and Port Numbers- Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19177398-ip-addresses-mac-addresses-and-port-numbers-part-1). Or view this lecture on [IP Support Protocols - Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19177457-ip-support-protocols-part-1).*
109
# Define: Temporal Key Integrity Protocol | (TKIP)
A security protocol for wireless networks that provided dynamic key generation, superseded due to weaknesses. ## Footnote TKIP is a security protocol used in wireless networking to provide a more secure encryption method than WEP. It dynamically generates a new key for each packet, reducing the risk of key compromise. TKIP was later superseded by more secure protocols like WPA2. *For more information, view this lecture on [WiFi - Part 2](https://courses.thorteaches.com/courses/take/cissp/lessons/29948642-wifi-part-2). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Temporal_Key_Integrity_Protocol).*
110
# Define: Teredo
A tunneling protocol designed to provide IPv6 connectivity over IPv4 networks. ## Footnote A tunneling protocol designed to grant IPv6 connectivity to networks behind IPv4 NAT devices. Teredo encapsulates IPv6 packets within IPv4 UDP datagrams, promoting interoperability between the two IP versions during the transition to IPv6. *For more information, visit this [Wikipedia page](https://en.wikipedia.org/wiki/Teredo_tunneling).*
111
# Define: Throughput
The volume of data transferred over a system or network within a given time frame. ## Footnote The amount of data that can be transferred from one point to another over a set period. In the context of network security, high throughput is desirable as it means data can be transferred quickly and efficiently, but it must be balanced against potential security risks such as data breaches or unauthorized access. Monitoring throughput is also important, as unexpected changes could indicate a security issue, like a denial-of-service attack or network intrusion. *For more information, view this lecture on [Network Performance and Traffic Management](https://courses.thorteaches.com/courses/take/cissp/lessons/54399148-new-2024-network-performance-and-traffic-management). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Throughput).*
112
# Define: Time Multiplexing
A technique that allows multiple signals to share one transmission medium by allocating time slots. ## Footnote A process in which multiple signals or data streams share the same transmission medium by dividing the available bandwidth into different time intervals, each for a separate signal or stream. This technique is extensively used in digital and analog communication to transmit multiple signals over a single communication channel, ensuring efficient use of resources and maintaining the integrity of each individual signal. *For more information, visit this [Wikipedia page](https://en.wikipedia.org/wiki/Time-division_multiplexing).*
113
# Define: Time Offset
The difference in time between time zones or between a local time and UTC. ## Footnote The difference in time between two different time zones or between a specific time zone and Coordinated Universal Time (UTC). In a networking context, a time offset can be used to synchronize clocks on different systems, ensuring that time-stamped events or logs are accurate across an entire network. An accurate time offset is crucial for incident response and forensic activities as it allows the correct sequencing of events that have been logged by different systems. *For more information, visit this [Wikipedia page](https://en.wikipedia.org/wiki/Time_offset).*
114
# Define: Time To Live | (TTL)
A value that limits the lifespan of data on a network to prevent infinite transmission loops. ## Footnote A concept primarily used in networking, where it signifies the lifespan or lifetime of data in a computer or network. Specifically, in IP networking, TTL refers to the maximum number of hops that data packets are allowed to traverse before being discarded, helping to prevent the endless circulation of misdirected packets and potential network clogging. *For more information, view this lecture on [IP addresses, MAC addresses, and port numbers- Part 3](https://courses.thorteaches.com/courses/take/cissp/lessons/22874065-ip-addresses-mac-addresses-and-port-numbers-part-3). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Time_to_live).*
115
# Define: Time-Division Multiplexing | (TDM)
A method that transmits multiple data streams over one medium by dividing signals into time slots. ## Footnote A communication process that transmits multiple data streams over a single medium by dividing the signals into separated time slots. By employing this approach, multiple users or processes can share the same communication channel without significant interference or signal degradation, promoting the efficient use of network resources. *For more information, visit this [Wikipedia page](https://en.wikipedia.org/wiki/Time-division_multiplexing).*
116
# Define: Token Ring
A network topology where nodes are connected in a loop, and data packets travel around the ring. ## Footnote A type of computer network topology where each machine is connected to the network in a closed loop or ring. Each computer or server is connected to the next, creating a circular network path. Data packets travel around the ring, stopping at each node. If the data is not recognized by the node, it is passed along to the next node in the ring. *For more information, view this lecture on [LAN topologies](https://courses.thorteaches.com/courses/take/cissp/lessons/19177530-lan-topologies). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Token_ring).*
117
# Define: Topology
The layout or arrangement of elements within a network, influencing performance and security. ## Footnote The arrangement of various elements (nodes, links, etc.) in a network. The physical layout (physical topology) or logical connections (logical topology) form the backbone of the network's design. Different types of topologies, such as star, ring, mesh, bus, or tree, can impact the network's performance, reliability, and resilience to disruptions, including security incidents. *For more information, view this lecture on [LAN topologies](https://courses.thorteaches.com/courses/take/cissp/lessons/19177530-lan-topologies). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Network_topology).*
118
# Define: Tor
Tor (The Onion Router) is a privacy-focused network that routes traffic through multiple volunteer-operated relays, concealing users’ IP addresses and online activities. ## Footnote By encrypting data in layered “onion” packets, Tor offers anonymity against network surveillance or geographic censorship. Activists, journalists, and privacy enthusiasts rely on Tor for secure communications. Critics argue it can conceal illicit activities on the darknet. However, lawful uses include bypassing oppressive regimes’ censorship. Users face slower speeds due to multi-hop routing, but Tor remains a robust privacy tool worldwide. *For more information, visit this [Wikipedia page](https://en.wikipedia.org/wiki/Tor_(anonymity_network)).*
119
# Define: Traceroute
A network diagnostic tool showing the route that data packets take across a network. ## Footnote A network diagnostic tool that traces the path data takes from one computer to another on the internet, highlighting each hop and the time taken to get from one node to the next. Traceroute helps in identifying network bottlenecks and routing issues. *For more information, view this lecture on [IP support protocols - Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19177457-ip-support-protocols-part-1). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Traceroute).*
120
# Define: Tracert
A Windows command-line tool similar to traceroute that traces the route of packets to their destination. ## Footnote A command-line utility that functions similarly to traceroute, providing a detailed list of network hops that data packets take to reach their destination from their source. It is primarily used on Windows operating systems and is useful in diagnosing network connectivity issues, such as identifying at which hop a packet gets lost or delayed. *For more information, view this lecture on [IP support protocols - Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19177457-ip-support-protocols-part-1). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Traceroute#Microsoft_Windows).*
121
# Define: Trailer | (in Networking)
The end section of a data packet containing control information for data communication. ## Footnote A data packet's trailing part, containing control information for data communication, such as error checking and other types of metadata. Trailers are used to ensure the integrity and proper transmission of data packets. *For more information, visit this [Wikipedia page](https://en.wikipedia.org/wiki/Encapsulation_(networking)).*
122
# Define: Transmission Control Protocol | (TCP)
A core internet protocol providing reliable, ordered delivery of data between networked applications. ## Footnote A core protocol of the Internet protocol suite that provides reliable, ordered, and error-checked delivery of data between applications running on hosts connected to a network. It is widely used in data transmission over networks due to its ability to create connections between machines to exchange data packets reliably. *For more information, view this lecture on [Networking basics and definitions.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177258-networking-basics-and-definitions). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Transmission_Control_Protocol).
123
# Define: Transport Layer
A layer in network architecture managing end-to-end data transmission between systems, ensuring error-free communication. ## Footnote A component of the multi-layered architecture of network protocols, such as the TCP/IP protocol suite. Its main responsibilities include end-to-end communication management and reliable data transfer between applications or services operating on hosts in a network. The transport layer ensures data is delivered error-free, in sequence, and with no loss, duplications, or corruption. *For more information, view this lecture on [The OSI model- Part 2.](https://courses.thorteaches.com/courses/take/cissp/lessons/22712043-the-osi-model-part-2). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Transport_layer).
124
# Define: Transport Layer Security | (TLS)
A cryptographic protocol ensuring secure communications across networks through encryption and integrity checks. ## Footnote A cryptographic protocol designed to provide secure communication across a network. The protocol uses asymmetric cryptography for authentication, symmetric encryption for privacy, and message authentication codes for message integrity. It's extensively used in web browsing, email, instant messaging, and voice-over-IP (VoIP), among other applications. *For more information, view this lecture on [MAC, HMAC, SSL, and TLS.](https://courses.thorteaches.com/courses/take/cissp/lessons/19149773-mac-hmac-ssl-and-tls). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Transport_Layer_Security).
125
# Define: Transport Mode | (in IPSec)
A mode in IPSec that encrypts only the data payload of an IP packet, leaving the header unencrypted, used for end-to-end communications. ## Footnote In IPSec, transport mode encrypts only the payload of the IP packet, not the IP header itself, which is left intact. It's mainly used for end-to-end communications, such as encrypting data for VPN connections between two hosts. *For more information, view this lecture on [IPSec and PGP.](https://courses.thorteaches.com/courses/take/cissp/lessons/19149746-ipsec-and-pgp). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/IPsec#Modes_of_operation).
126
# Define: Tree Topology
A network topology resembling a tree structure, with a single root node connected to multiple branch nodes. ## Footnote A type of network topology structured in a hierarchy, with a single 'root' node (typically a switch or a hub) that connects multiple sets of 'branches' (sub-networks), resembling a tree structure. It allows for the expansion of an existing network and is instrumental in organizing the networks in a manageable fashion. *For more information, view this lecture on [LAN topologies.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177530-lan-topologies). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Tree_network).
127
# Define: Trivial File Transfer Protocol | (TFTP)
A simple protocol for transferring files over a network without authentication or elaborate error handling. ## Footnote A simplified version of the FTP protocol that is used to transfer files over networks. Unlike FTP, it doesn't require user authentication and operates on UDP, making it faster but less secure. It is commonly used in devices like routers or IP phones for firmware or configuration uploads. *For more information, view this lecture on [IP support protocols - Part 1.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177457-ip-support-protocols-part-1). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Trivial_File_Transfer_Protocol).
128
# Define: Trunk Ports
Switch ports configured to carry traffic for multiple VLANs over a single link. ## Footnote Trunk Ports are specialized connections on network switches that transport data from multiple VLANs through a single physical link using tagging protocols. This configuration maximizes efficiency in network design by consolidating traffic while maintaining logical separation between different network segments. Trunk ports are essential for large-scale, segmented networks that require scalable and efficient data routing. *For more information, view this lecture on [Layer 1 to 3 networking devices.](https://courses.thorteaches.com/courses/take/cissp/lessons/19178219-layer-1-to-3-networking-devices). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/VLAN#Cisco_VLAN_Trunking_Protocol).
129
# Define: Tunnel
A secure path for data transmission using encryption, commonly found in VPNs for private communication over public networks. ## Footnote A secure communication channel that uses encryption and encapsulation to transmit data privately across public networks. Often used in the context of VPNs to ensure secure, remote access to a network, keeping the data confidential and intact from end to end. *For more information, view this lecture on [Networking basics and definitions.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177258-networking-basics-and-definitions). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Tunneling_protocol).
130
# Define: Tunnel Mode
An IPsec mode that encrypts both the payload and the header for secure transmission, often used in VPNs. ## Footnote A mode of operation in IPsec where both the header and the payload of the IP packet are protected during transmission. This mode is commonly used in VPNs (Virtual Private Networks) as it allows a network device to act as an intermediary, encapsulating and encrypting all traffic passing through it. *For more information, view this lecture on [IPSec and PGP.](https://courses.thorteaches.com/courses/take/cissp/lessons/19149746-ipsec-and-pgp). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/IPsec#Modes_of_operation).
131
# Define: Tunneling
The practice of encapsulating data for transmission across networks, ensuring secure movement from one network to another. ## Footnote  Tunneling is a protocol that allows for the secure movement of data from one network to another. It involves encapsulating a network protocol within packets carried by the second network. Tunneling is often used in virtual private networks (VPNs) to secure data over untrusted networks like the internet. *For more information, view this lecture on [Networking basics and definitions.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177258-networking-basics-and-definitions). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Tunneling_protocol).
132
# Define: Twisted Pair
Cabling with pairs of wires twisted together to reduce interference, used in network and telephone systems. ## Footnote A type of cabling used for data and voice communications, characterized by pairs of wires twisted together. The twisting helps to reduce interference and noise. This cable type can be found in various versions, including unshielded twisted pair (UTP) and shielded twisted pair (STP), each offering different levels of protection against electromagnetic interference. *For more information, view this lecture on [Cable types.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177465-cable-types). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Twisted_pair).
133
# Define: Unicast
A one-to-one communication where data is transmitted from a single sender to a single receiver. ## Footnote Unicast represents a direct communication model in which data flows from one sender to one specific receiver. It is the most common form of data transmission across networks, ensuring that information is delivered along dedicated channels. This method underpins routine web browsing, email communication, and most network applications requiring private and reliable data exchanges. *For more information, view this lecture on [IP addresses, MAC addresses, and port numbers- Part 2.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177405-ip-addresses-mac-addresses-and-port-numbers-part-2). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Unicast).
134
# Define: Unified Threat Management | (UTM)
Integrated solutions combining various security functions for comprehensive protection. ## Footnote A type of security solution that consolidates multiple security functions into a single system, aiming to simplify management and provide comprehensive protection. The consolidated functions may include firewall, antivirus, intrusion detection and prevention, and data loss prevention, among others. *Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Unified_threat_management).
135
# Define: Uniform Resource Locator | (URL)
The address of a resource on the internet, allowing users to locate and access different websites. ## Footnote A web address that specifies the location of a resource on the internet. It consists of a protocol (such as HTTP or HTTPS), a domain name, and sometimes a path to a specific file or resource. It is used to navigate websites and access online resources. Examples include www.google.com, www.facebook.com, and www.thorteaches.com. *Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/URL).
136
# Define: Unshielded Twisted Pair | (UTP)
A type of data cable without additional shielding, used primarily within buildings for Ethernet and telecommunications. ## Footnote A type of cable used in networking that consists of two twisted copper wires surrounded by insulation. It is used to transmit data over short distances, such as within a building or between nearby buildings. Examples include Ethernet cables and telephone wires. *For more information, view this lecture on [Cable types.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177465-cable-types). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Twisted_pair#Unshielded_twisted_pair_(UTP)).
137
# Define: URL Filtering
A security technique to block or restrict access to certain websites by analyzing their URLs. ## Footnote A technique used to block access to certain websites based on their URLs. It's commonly used to prevent access to malicious websites or to enforce policies against accessing inappropriate or non-work-related content. This can reduce the risk of malware infection and data leakage, as well as increase productivity. *Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Firewall_(computing)#Most_common_firewall_log_types).
138
# Define: User Datagram Protocol | (UDP)
A communication protocol facilitating quick data exchange without the need for a connection setup. ## Footnote A type of internet protocol that allows applications to send and receive data without the need for an underlying connection-oriented protocol. It is used in applications that require low-latency or real-time data transmissions, such as online gaming and voice-over IP. Examples include Skype, online gaming, and video conferencing. *For more information, view this lecture on [Networking basics and definitions.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177258-networking-basics-and-definitions). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/User_Datagram_Protocol).
139
# Define: Virtual Circuits
A model for network communications creating a logical path between nodes for secure data delivery. ## Footnote A connection-oriented communication model that allows data to be delivered between two network nodes. They create a logical path between source and destination, mimicking the behavior of a physical circuit but over a shared network infrastructure, providing a degree of isolation and security between communication sessions. *For more information, view this lecture on [WAN protocols.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177534-wan-protocols). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Virtual_circuit).
140
# Define: Virtual Extensible Local Area Network | (VXLAN)
Technology that extends LANs across dispersed data centers improving scalability and isolation. ## Footnote A network virtualization technology that attempts to address the scalability issues associated with large cloud computing environments. It uses a virtual network identifier to enable the creation of isolated, multi-tenant broadcast domains in a network, providing the ability to spawn fine-grained networks on demand with improved security and isolation. *For more information, view this lecture on [SAN and VoIP protocols.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177558-san-and-voip-protocols). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/VXLAN).
141
# Define: Virtual LAN | (VLAN)
A logical group of network devices that can be segmented by function or application regardless of physical location. ## Footnote A group of devices on a LAN that are grouped together logically, regardless of their physical location. VLANs are used to segment network traffic and improve network security. Examples of VLANs include departmental VLANs, guest VLANs, and VLANs for virtual machines. *For more information, view this lecture on [Layer 1 to 3 networking devices.](https://courses.thorteaches.com/courses/take/cissp/lessons/19178219-layer-1-to-3-networking-devices). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Virtual_LAN).
142
# Define: Virtual Private Network | (VPN)
A secure connection method that creates private networks over public infrastructure to protect data transmission. ## Footnote A secure connection method used to add security and privacy to private and public networks. VPNs use encryption and other security mechanisms to ensure that only authorized users can access the network and that the data cannot be intercepted, offering secure communication over potentially insecure networks, such as the internet. *For more information, view this lecture on [Secure Communications - Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19178318-secure-communications-part-1). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Virtual_private_network).
143
# Define: Virtual Private Network (VPN) Concentrator
A device that manages VPN connections, providing secure, encrypted channels for multiple users. ## Footnote A networking device that creates a secure end for multiple VPN connections, providing capabilities like data encryption and tunneling protocols. It is often used in scenarios where numerous VPN connections are required, such as for remote workers or multiple office locations, ensuring secure and efficient network access. *For more information, view this lecture on [Secure Communications - Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19178318-secure-communications-part-1).
144
# Define: VLAN Hopping
A network attack where perpetrators exploit VLAN configurations to gain access to restricted network segments. ## Footnote A network exploit in which an attacker is able to send packets to or receive packets from a VLAN that they should not have access to, thus breaching a network's segmentation. This could lead to unauthorized access to information, spoofing, or attacks on the network. *Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Virtual_LAN#VLAN_hopping).*
145
# Define: VLAN Pruning
The process of restricting unnecessary VLAN traffic on network trunk links to optimize performance. ## Footnote VLAN pruning involves the deliberate filtering of VLAN traffic on trunk links to eliminate the propagation of unnecessary broadcasts and reduce network congestion. By ensuring that only relevant VLAN data is transmitted across specific links, this technique enhances bandwidth utilization and improves overall network performance. VLAN pruning is a key optimization strategy in managed switches and complex network environments. *For more information, view this lecture on [Layer 1 to 3 networking devices.](https://courses.thorteaches.com/courses/take/cissp/lessons/19178219-layer-1-to-3-networking-devices).*
146
# Define: Voice Mail
A service for recording voice messages that can be retrieved by the intended recipient at a later time. ## Footnote A service that allows individuals to leave voice messages for other individuals or groups, typically through a telephone or computer system. Voice mail is used to enable communication when the recipient is unavailable or unreachable. Examples of voice mail systems include voicemail boxes, voice mail servers, and voice mail applications. *Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Voicemail).*
147
# Define: Voice Over IP | (VoIP)
Technology enabling voice communication over internet protocol networks, often used for telephone services. ## Footnote A technology that allows voice communication to be transmitted over the internet or other IP-based networks. VoIP is used to enable voice communication over long distances at a lower cost than traditional phone systems. Examples of VoIP systems include Skype, Google Voice, and Vonage. *For more information, view this lecture on [SAN and VoIP protocols.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177558-san-and-voip-protocols). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Voice_over_IP).*
148
# Define: VSAN | (Virtual Storage Area Network)
A virtual partitioning of a physical SAN to isolate and manage storage resources. ## Footnote A Virtual Storage Area Network (VSAN) segments a physical storage area network into multiple logical networks, each operating independently. This partitioning isolates data traffic, enhances security, and simplifies management by allowing dedicated resources for different applications or departments. VSANs improve the flexibility and scalability of storage solutions while reducing the risk of data leakage across organizational boundaries. *For more information, view this lecture on [SAN and VoIP protocols.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177558-san-and-voip-protocols). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Virtual_storage_area_network).*
149
# Define: WAF | (Web Application Firewall)
A specialized firewall that protects web applications by filtering and monitoring web traffic. ## Footnote A specific form of firewall designed to protect web applications by filtering and monitoring HTTP traffic between a web application and the internet. It can prevent attacks stemming from web application security flaws, such as SQL injection, cross-site scripting (XSS), and security misconfigurations. *Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Web_application_firewall).*
150
# Define: Wave-Division Multiplexing | (WDM)
A fiber-optic transmission technique that involves sending multiple signals simultaneously using different wavelengths. ## Footnote A technique in fiber optics that combines multiple optical signals so they can be transmitted simultaneously over a single fiber. The signals are separated by using different wavelengths (colors) of light, which helps increase the overall capacity and speed of data transmission. *For more information, view this lecture on [Cable types.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177465-cable-types). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Wavelength-division_multiplexing).*
151
# Define: Web Proxy
A server that acts as an intermediary between users and the internet to provide functionalities like caching and security. ## Footnote An intermediary that sits between a user's device and the internet, intercepting requests and responses, often to provide functionalities like caching, security, or anonymity. It can be used to control, accelerate, or secure internet navigation, and can also mask the user's original IP address. *Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Proxy_server).*
152
# Define: Web Security Gateway
A solution that filters and monitors web traffic to protect an internal network from unsecured or malicious content. ## Footnote A security solution that prevents unsecured traffic from entering an internal network of an organization. It is used to protect against web-based threats such as viruses, worms, Trojans, and other malicious software by monitoring web traffic at the application level to detect and block anything malicious.
153
# Define: Well-Known Ports
Standardized network ports for mainline services like HTTP, HTTPS, and SSH that facilitate proper network traffic routing. ## Footnote The standardized network port numbers used by internet protocols to identify and communicate with specific services and applications. It is used to ensure that network traffic is routed to the correct destination on the network. Examples include port 80 for HTTP, port 443 for HTTPS, and port 22 for SSH. *For more information, view this lecture on [IP addresses, MAC addresses, and port numbers- Part 1.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177398-ip-addresses-mac-addresses-and-port-numbers-part-1). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/List_of_TCP_and_UDP_port_numbers).*
154
# Define: Wide Area Network | (WAN)
A telecommunications network that covers a large geographic area, connecting multiple LANs or smaller networks. ## Footnote A telecommunications network that extends over a large geographical distance, connecting multiple smaller networks, such as local area networks (LANs). WANs are used for transmitting data between different locations, cities, or even countries, often relying on leased lines or satellite links. *For more information, view this lecture on [WAN protocols.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177534-wan-protocols). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Wide_area_network).*
155
# Define: Wide Area Network (WAN) Switch
A device that routes data across a geographically spread network, managing traffic for reliability and efficiency. ## Footnote A network switch designed to route data across large geographic areas in a WAN, which may include multiple local area networks (LANs). WAN switches manage and optimize traffic across corporate and telecom networks, facilitating efficient and reliable long-distance communication.
156
# Define: Wi-Fi
A wireless networking technology that allows devices to connect to the internet without physical cables. ## Footnote A wireless networking technology that allows devices to connect to the internet without the use of physical cables. It is commonly used in homes, offices, and public spaces to provide internet access to devices such as laptops, smartphones, and tablets. Examples include home Wi-Fi networks and public Wi-Fi hotspots. *For more information, view this lecture on [WiFi - Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19178193-wifi-part-1). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Wi-Fi).*
157
# Define: Wi-Fi Protected Access | (WPA)
A wireless network security protocol providing encryption and user authentication to protect network connections. ## Footnote A security protocol designed to secure wireless (Wi-Fi) networks. Introduced as an improvement over the previous Wired Equivalent Privacy (WEP), WPA provides robust security through encryption and user authentication. WPA2 and WPA3, the later versions of this protocol, utilize Advanced Encryption Standard (AES) technology and offer improved security features to protect network traffic from eavesdropping and other forms of attacks. *For more information, view this lecture on [WiFi - Part 2](https://courses.thorteaches.com/courses/take/cissp/lessons/29948642-wifi-part-2). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access).*
158
# Define: Wi-Fi Protected Access 2 | (WPA2)
A wireless network security protocol that uses advanced encryption to protect data transmission. ## Footnote A security protocol for wireless networks that uses encryption to protect data transmitted over the network. It is commonly used in home and office Wi-Fi networks, as well as in public Wi-Fi hotspots. Examples of its use include securing data transmitted by a laptop to a wireless printer or protecting credit card information entered on a smartphone when connected to a public Wi-Fi network. *For more information, view this lecture on [Wireless Networks](https://courses.thorteaches.com/courses/take/cissp/lessons/29462523-wireless-networks). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access#WPA2).*
159
# Define: Wi-Fi Protected Access 3 | (WPA3)
The latest generation of Wi-Fi security, providing stronger protection for wireless networks than WPA2. ## Footnote Wi-Fi Protected Access 3 (WPA3) is the third and latest generation of the WPA security protocol for wireless networks. It was introduced to provide more robust authentication and increased cryptographic strength for highly sensitive data markets. WPA3 offers improved security features over its predecessor, WPA2, such as greater protection against offline dictionary attacks and forward secrecy, which ensures that captured traffic can't be decrypted even if the password is compromised later. *For more information, view this lecture on [Wireless Networks](https://courses.thorteaches.com/courses/take/cissp/lessons/29462523-wireless-networks). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access#WPA3).*
160
# Define: Wi-Fi Protected Setup | (WPS)
A feature that simplifies the connection of devices to a wireless network, although it has potential security weaknesses. ## Footnote A security feature that simplifies the process of setting up a wireless network and connecting devices to it. Used in home and office networks to make it easier for users to connect their devices. Examples include a WPS button on a router or a WPS PIN on a device. *For more information, view this lecture on [WiFi - Part 2](https://courses.thorteaches.com/courses/take/cissp/lessons/29948642-wifi-part-2). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Wi-Fi_Protected_Setup).*
161
# Define: Wi-Fi War Droning
Using drones equipped with Wi-Fi scanning tools to identify and exploit wireless network vulnerabilities. ## Footnote An activity where a drone equipped with a Wi-Fi scanner or hacker toolkit is used to identify and potentially exploit vulnerabilities in wireless networks. The mobility and compactness of drones enable them to reach locations that might be difficult for a human to access, allowing a wide or targeted search for unsecured or weakly secured networks. This activity can be used either for malicious intent or for legitimate purposes like security audits and penetration testing.
162
# Define: Wi-Fi Zones | (Coverage Areas)
Areas within the signal range of a Wi-Fi network where devices can connect and access the internet. ## Footnote The delineated areas within the range of a wireless network where devices can connect and communicate over Wi-Fi. Networks often overlap multiple zones, enabling seamless connectivity as users move around. Each zone corresponds to the signal range of a Wireless Access Point (WAP). *For more information, view this lecture on [WiFi - Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19178193-wifi-part-1).*
163
# Define: Windows DNS Server
A service that translates domain names into IP addresses within a Windows network. ## Footnote Windows DNS Server is a role in Windows Server that manages the mapping of domain names to IP addresses, enabling devices to locate and communicate with one another efficiently. It supports zone management, redundancy, and security features, making it a critical component for maintaining reliable network connectivity and seamless resource access. *Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Domain_Name_System).*
164
# Define: Windows Firewall With Advanced Security
An enhanced firewall integrated into Windows for detailed network traffic control and policy management. ## Footnote Windows Firewall with Advanced Security is a comprehensive security tool that provides granular control over inbound and outbound network traffic. It integrates firewall, IPsec, and advanced logging capabilities to enforce strict security policies, protect against unauthorized access, and manage network communications effectively, ensuring robust protection of Windows systems. *Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Windows_Firewall).*
165
# Define: Windows IP Configuration Commands
Command-line utilities used to configure, display, and troubleshoot Windows IP settings. ## Footnote Windows IP Configuration Commands, such as ipconfig, offer a set of command-line tools for viewing and managing network interface settings. They enable administrators to diagnose connectivity issues, manage IP addresses, and configure network parameters effectively, playing a vital role in maintaining reliable system and network operations. *Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Ipconfig).*
166
# Define: Wired Equivalent Privacy | (WEP)
An outdated wireless network security protocol with known vulnerabilities, replaced by WPA and WPA2 standards. ## Footnote An early security protocol designed for wireless networks. Introduced in 1997 as part of the original 802.11 wireless standard, it was intended to provide confidentiality comparable to that of a traditional wired network. However, WEP was found to have significant security vulnerabilities that made it relatively easy for attackers to decrypt network traffic. As a result, it has been largely replaced by more secure protocols, such as WPA and WPA2. *For more information, view this lecture on [WiFi - Part 2](https://courses.thorteaches.com/courses/take/cissp/lessons/29948642-wifi-part-2). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Wired_Equivalent_Privacy).*
167
# Define: Wireless Access Point | (WAP)
A device that enables wireless devices to connect to a wired network, serving as a bridge between the two. ## Footnote A networking device that enables wireless-capable devices to connect to a wired network. It acts as a communication hub by receiving and transmitting data between the wireless devices and the wired part of the network. WAPs are commonly used in homes and businesses to extend network coverage and allow for seamless internet connectivity for devices like computers, smartphones, and smart home devices. *For more information, view this lecture on [WiFi - Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19178193-wifi-part-1). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Wireless_access_point).*
168
# Define: Wireless Attacks
Malicious activities targeting wireless network vulnerabilities to intercept or manipulate data. ## Footnote Malicious attempts to compromise or intercept data transmitted over wireless networks. These attacks target vulnerabilities in wireless protocols and devices, ranging from Wi-Fi networks to Bluetooth connections. Wireless attacks can lead to unauthorized access, data breaches, and network disruption. Common examples include eavesdropping, man-in-the-middle attacks, and unauthorized network access. Defenses against these attacks include the use of strong encryption, secure authentication methods, and vigilant network monitoring. *For more information, view this lecture on [WiFi - Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19178193-wifi-part-1) and [WiFi - Part 2](https://courses.thorteaches.com/courses/take/cissp/lessons/29948642-wifi-part-2). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Wireless_security).*
169
# Define: Wireless Computing
Using computers and devices over wireless networks, offering mobility but requiring robust security measures. ## Footnote Any type of computer operation or application that operates without a wired connection. This includes activities such as internet access, file sharing, and device synchronization over a wireless network. It relies on wireless networking technologies like Wi-Fi or mobile data networks to provide connectivity. The benefit of wireless computing is increased mobility and convenience, as users are not tethered by cables and can access network resources from any location within the network's coverage area. *Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Wireless).*
170
# Define: Wireless Local Area Network | (WLAN)
A network that connects devices wirelessly within a localized area, typically using Wi-Fi technology. ## Footnote A type of network that allows devices to connect and communicate wirelessly within a localized area such as a home, school, office, or café. The most common standard for WLAN is Wi-Fi, which uses radio waves to provide wireless high-speed internet and network connections. In a WLAN, a wireless router serves as the communication hub, transmitting and receiving data from the networked devices. *For more information, view this lecture on [WiFi - Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19178193-wifi-part-1). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Wireless_LAN).*
171
# Define: Wireless Networks
Networks that use radio waves for data transmission, enabling communication without physical cabling. ## Footnote Data networks that use electromagnetic waves to connect devices and transmit information without the need for physical wiring. These can range from simple Bluetooth device pairings to complex mobile data networks spanning entire countries. Wireless networks enable flexibility and mobility, allowing devices to connect to the network from anywhere within the signal's range, making them ideal for environments where wired connections are impractical or impossible. *For more information, view this lecture on [WiFi - Part 1](https://courses.thorteaches.com/courses/take/cissp/lessons/19178193-wifi-part-1). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Wireless_network).*
172
# Define: Wireless Technology
Technology enabling data transmission without cables, including Wi-Fi, cellular networks, and Bluetooth. ## Footnote Any method of data transfer or communication that does not require a physical connection via cables or wires. This encompasses a wide range of technologies and standards, including Wi-Fi for local area networking, cellular networks for mobile communication and internet access, Bluetooth for short-range device-to-device connections, and satellite communications for global coverage. By eliminating the need for physical connections, wireless technology provides increased mobility, convenience, and adaptability. *For more information, view this lecture on [Wireless Networks](https://courses.thorteaches.com/courses/take/cissp/lessons/29462523-wireless-networks). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Wireless).*
173
# Define: Wireshark
A network protocol analyzer that allows users to capture and inspect network traffic in detail. ## Footnote An open-source tool widely used for network protocol analysis. It allows users to observe the data being transmitted over their networks at a microscopic level. Wireshark can be used to troubleshoot network issues, examine security problems, verify network applications, and learn network protocol internals. Its utility in understanding and diagnosing network behaviors makes it an important tool for network professionals. *Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Wireshark).*
174
# Define: Wireshark
A network protocol analyzer for capturing and examining network traffic in real time. ## Footnote Wireshark is an open-source network analysis tool that captures packets from various network interfaces. It allows detailed inspection of traffic and protocols, making it invaluable for troubleshooting network issues, performing security audits, and teaching network protocol fundamentals. Its rich feature set supports deep packet analysis across numerous protocols. *Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Wireshark).*
175
# Define: World Wide Web | (WWW)
A system of interlinked documents accessible over the internet, changing global information access and sharing. ## Footnote An information system where documents and other web resources are identified by Uniform Resource Locators (URLs), which may be interlinked by hypertext and accessible over the internet. The web has drastically changed how we access and share information globally. *For more information, view this lecture on [Networking basics and definitions.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177258-networking-basics-and-definitions). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/World_Wide_Web).*
176
# Define: X.25
An older packet-switched network communication protocol that provided reliable data transmission. ## Footnote A data link protocol used in packet-switched networks. It is commonly used in public data networks and provides error detection and recovery, flow control, and routing. Examples include X.25 over IP, X.25 over ATM, and X.25 over Frame Relay. *For more information, view this lecture on [WAN protocols.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177534-wan-protocols). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/X.25).*
177
# Define: X.25 Interface
A protocol suite for packet-switched communications, used in legacy networking and data services. ## Footnote A protocol suite for packet-switched network communications, X.25 facilitates data transmissions across long distances. It was widely used in the pre-Internet era for connecting terminals to computers, providing error correction and flow control. Although largely superseded by newer technologies, X.25 laid the groundwork for modern network communication standards. *For more information, view this lecture on [WAN protocols.](https://courses.thorteaches.com/courses/take/cissp/lessons/19177534-wan-protocols). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/X.25).*
178
# Define: Xmas Attack/Scan
A network scanning method that sets multiple TCP header flags to provoke responses for reconnaissance. ## Footnote A network scanning technique that manipulates the TCP header flags, sending packets with the FIN, URG, and PSH flags set—resembling a lit-up Christmas tree. It is designed to probe for responses that can reveal information about active services on network devices, potentially identifying vulnerable targets for further exploits. *Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Christmas_tree_packet).*
179
# Define: Zero Trust Network Access | (ZTNA)
ZTNA grants application or resource access on a strict need-to-know basis, continuously verifying user and device trust rather than implicitly trusting internal networks. ## Footnote Traditional models assume users inside a corporate network are trusted. Zero Trust shifts to verifying every request with identity, context, and posture checks. ZTNA solutions often segment resources, requiring micro-perimeters and dynamic access controls. Successful deployment involves robust identity management, device compliance checks, and constant telemetry monitoring. This approach minimizes lateral movement risks, limiting the blast radius if attackers breach initial defenses. *For more information, view this lecture on [Secure Access Service Edge](https://courses.thorteaches.com/courses/take/cissp/lessons/54398562-new-2024-sase-secure-access-service-edge). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Zero_trust).*
180
# Define: ZigBee Protocol
A low-power wireless communication standard used in IoT devices for smart home and industrial automation. ## Footnote A wireless communication standard for low-power, low-data-rate devices such as sensors, switches, and other smart home devices. It is commonly used in home automation systems and other IoT applications. Examples of its use include connecting a smart thermostat to a home automation system or controlling lights and appliances with a smart home app. *For more information, view this lecture on [Wireless Networks](https://courses.thorteaches.com/courses/take/cissp/lessons/29462523-wireless-networks). Or visit this [Wikipedia page](https://en.wikipedia.org/wiki/Zigbee).*