Term
|
Definition
The term used by Cisco to refer to a variety of security tools that help prevent various attacks, including antivirus, anti-phishing, and anti-spam. |
|
|
Term
|
Definition
The process by which a connection-oriented protocol creates a connection. With TCP, a connection is established by a three-way transmission of TCP segments. |
|
|
Term
|
Definition
|
|
Term
|
Definition
A type of attack whose goal is to cause problems by preventing legitimate users from being able to access services, thereby preventing the normal operation of computers and networks. |
|
|
Term
|
Definition
The process of discovering whether or not a data-link level frame was changed during transmission. This process typically uses a Frame Check Sequence (FCS) field in the data-link trailer. |
|
|
Term
|
Definition
The process of noticing when some transmitted data was not successfully received and resending the data until it is successfully received. |
|
|
Term
|
Definition
A device that forwards packets between the less secure and more secure parts of the network, applying rules that determine which packets are allowed to pass, and which are not. |
|
|
Term
|
Definition
The process of regulating the amount of data sent by a sending computer toward a receiving computer. Several flow control mechanisms exist, including TCP flow control, which uses windowing. |
|
|
Term
|
Definition
A process used by protocols that do error recovery in which the number that acknowledges data lists the next data that should be sent, not the last data that was successfully received. |
|
|
Term
|
Definition
HTTP Hypertext Transfer Protocol |
|
|
Term
Hypertext Transfer Protocol |
|
Definition
The protocol used by web browsers and web servers to transfer files, such as text and graphic files. |
|
|
Term
|
Definition
Intrusion Detection System |
|
|
Term
Intrusion Detection System |
|
Definition
A security function that examines more complex traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out, rating each perceived threat and reporting the threats. |
|
|
Term
|
Definition
Intrusion Prevention System |
|
|
Term
Intrusion Prevention System |
|
Definition
A security function that examines more complex traffic patterns against a list of both known attack signatures and general characteristics of how attacks may be carried out, rating each perceived threat and reacting to prevent the more significant threats. |
|
|
Term
|
Definition
A networking function, included in TCP, in which the protocol defines how the sending host should number the data transmitted, defines how the receiving device should attempt to reorder the data if it arrives out of order, and specifies to discard the data if it cannot be delivered in order. |
|
|
Term
|
Definition
In TCP and UDP, a number that is used to uniquely identify the application process that either sent (source port) or should receive (destination port) data. In LAN switching, another term for switch interface. |
|
|
Term
|
Definition
Positive Acknowledgment and Retransmission |
|
|
Term
Positive Acknowledgment and Retransmission |
|
Definition
A generic reference to how the error recovery feature works in many protocols, including TCP, in which the receiver must send an acknowledgment that either implies that the data was (positively) received, or send an acknowledgement that implies that some data was lost, so the sender can then resend the lost data. |
|
|
Term
|
Definition
1. In TCP, a term used to describe a TCP header and its encapsulated data (also called an L4PDU).
2. In TCP, the process of accepting a large chunk of data from the application layer and breaking it into smaller pieces that fit into TCP segments. |
|
|
Term
|
Definition
For protocols such as TCP that allow the receiving device to dictate the amount of data the sender can send before receiving an acknowledgment—a concept called a window—a reference to the fact that the mechanism to grant future windows is typically just a number that grows upwards slowly after each acknowledgment, sliding upward. |
|
|
Term
|
Definition
Universal Resource Locator |
|
|
Term
Universal Resource Locator |
|
Definition
A standard for how to refer to any piece of information retrievable via a TCP/IP network, most notably used to identify web pages. For example, http://www.cisco.com/univercd is a URL that identifies the protocol (HTTP), hostname (www.cisco.com), and web page (/univercd). |
|
|
Term
|
Definition
|
|
Term
|
Definition
The process of securing communication between two devices whose packets pass over some public and unsecured network, typically the Internet. VPNs encrypt packets so that the communication is private and authenticate the identity of the endpoints. |
|
|
Term
|
Definition
Voice over Internet Protocol |
|
|
Term
|
Definition
The transport of voice traffic inside IP packets over an IP network. |
|
|
Term
|
Definition
Software, running on some computer, that stores web pages and sends those web pages to web clients (web browsers) that request the web pages. |
|
|