Front | Back |
AAA
|
Authentication Authorization and Accounting 1. Authentication has 2 components: Identification (Username or email address) and the authentication factor (Something you know, Something you have, Something you are, Somewhere you are or are not, Something you do) 2. Authorization: the rights and privileges assigned to a user to be able to perform their job. 3. Accounting or Auditing: Accounting is the process of recording system activities and resource access. Auditing is part of accounting where an administrator examines logs of what was recorded.
|
AAAA
|
Authentication, Authorization, Accounting, and Auditing
|
ACK
|
Acknowledgment An acknowledgment signal is sent between hosts to signify receipt of the data as part of the connection-oriented communications protocol to indicate that data is received in the expected condition.
|
ACL
|
Access Control List A set of data (user names, passwords, time and date, IP address, MAC address, etc.) that is used to control access to a resource, such as a device, file, or network.
|
ADSL
|
Asymmetric Digital Subscriber Line
|
AES
|
Advanced Encryption Standard Symmetric block cipher. Three different key sizes; 128, 192, & 256 bit. Used in BitLocker
|
AH
|
Authentication Header An IPSec protocol that provides authentication as well as integrity & protection from replay attacks. Uses protocol # 51.
|
AP
|
Access Point Sometimes referred to as a WAP (Wireless Access Point). An AP is a bridge between wireless and wired networks.
|
APC
|
Angle Polished Connector
|
API
|
Application Programming Interface A library of programming utilities used, for example, to enable software developers to
access functions of the TCP/IP network stack under a particular operating system. |
APIPA
|
Automatic Private Internet Protocol Addressing A service that enables a DHCP client device to configure itself automatically with an IP address on the 169.254.0.0 network in case no DHCP servers respond to the client's DHCP discover broadcast.
|
APT
|
Advanced Persistent Threat An attack that uses multiple attack vectors, attempt to remain hidden as to maintain a connection to compromised systems. You can normally tie this to nation-states (foreign countries).
|
ARIN
|
American Registry for Internet Numbers
|
ARP
|
Address Resolution Protocol: A communication protocol that resolves IP addresses to MAC addresses.
|
AS
|
Autonomous System A self-contained network on the Internet that deploys a single protocol and has a single administration. Also called a routing domain.
|