Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

Page:  1  2  3  4  5  6  7  8  9  10  ...  56  (Next)



  •  IPv6 transition mechanism for migrating from Internet Protocol version 4 (IPv4) to IPv6
  • tunneling protocol that encapsulates IPv6 packets on specially configured IPv4 links according to the specifications of RFC 4213
  • IP protocol number for 6in4 is 41, per IANA reservation



  • Authentication Authorization  Accounting (AAA)
  • used to refer to a family of protocols that mediate network access
  • Authentication is used to verify the identity of a person
  • Authorization is used to verify the persons has the correct permissions to access something
  • Accounting involves recording the persons access, by logging their activities


  • After Action Report (AAR)
  • retrospective analysis on a given sequence of goal-oriented actions previously undertaken

Access Control

  • management of admission to system and network resources
  • grants authenticated users access to specific resources based on company policies and the permission level assigned to the user or user group
  • often includes authentication, which proves the identity of the user or client machine attempting to log in
  • often includes authorization, which is the process of determining which level of access each user is granted
  • can include physical access control, such as a locked door, or security guard
  • can include information access control, such a network login


  • Access Control List (ACL)
  • permissions attached to an object that specify which users are granted access to that object and the operations it is allowed to perform
  • each entry in an access control list specifies the subject and an associated operation that is permitted


  • Active Directory (AD)
  • Windows OS directory service that facilitates working with interconnected, complex and different network resources in a unified manner
  • provides a common interface for organizing and maintaining information related to resources connected to a variety of network directories
  • directories may be
    • systems-based
    • application-specific
    • network resources, like printers
  • serves as a single data store for quick data access to all users and controls access for users based on the directory's security policy


  • Android Debug Bridge  (ADB)
    • command-line tool that lets you communicate with a device
    • facilitates a variety of device actions, such as installing and debugging apps
    • provides access to a Unix shell that you can use to run a variety of commands on a device

Agile Development

  • practices involve discovering requirements and developing solutions through the collaborative effort of self-organizing and cross-functional teams and end users
  • advocates adaptive planning, evolutionary development, early delivery, and continual improvement
  • encourages flexible responses to change


  • Aircrack-ng
    • suite of tools that provide capabilities for conducting RF communication monitoring and wireless network security auditing
    • network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs
    • Works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic
    • Runs under Linux, FreeBSD, macOS, OpenBSD, and Windows


  • Annualized Loss Expectancy (ALE)
  • annual expected financial loss from an asset because of a particular event occurring within one year
  • ALE = ARO × SLE

Page:  1  2  3  4  5  6  7  8  9  10  ...  56  (Next)