Front | Back |
Cache
|
Temporary storage area
|
Classful addressing
|
IP addresses that are split between the network and hosp portions set on the boundaries between the bytes
|
Convergence
|
Unifying voice and data traffic over a single internet protocol network
|
Core switches
|
Switches that reside at the top of the hierarchy and carry traffic between switches
|
DMZ (demilitarized zone
|
Separate network that sits outside the secure network perimeter, often used to provide "outside services" such as Web service and e-mail
|
Honey pot
|
Server intended to trap or trick attacker
|
HIPS (host intrusion prevention system)
|
Intrusion prevention systems that are installed on local systems
|
Integrated network security hardware
|
Hardware device that integrates multipurpose security multipurpose security appliances with a traditional network device such as a switch or router
|
Internet content filters
|
Technology to monitor internet traffic and block access to preselected Web sites and files
|
IPS (intrusion prevention system)
|
System that finds malicious traffic and deals with it immediately
|
IP telephony
|
Adding digital voice clients and new voice applications onto the IP network
|
Multiplexed
|
Services such as voice, video, and data combined and transported under a universal format
|
NAC (network access control)
|
Technology that examines the current state of a system and corrects any deficiencies before it is allowed to connect to the network
|
NAT (network address translation)
|
Technology that hides the IP address of network devices from attackers
|
NIDS (network intrusion detection system)
|
System to monitor and possibly prevent attempts to attack a local system
|