Network

|| || || || || || ||
 * Air Gap || A security measure often taken for computers and computer networks that must be extraordinarily secure. It consists of ensuring that a secure network is completely physically, electrically, and electromagnetically isolated from insecure networks, such as the public Internet or an insecure local area network.
 * Application Gateway || Applies security mechanisms to specific applications, such as FTP and Telnet servers.
 * Certificate || Public key certificate, an electronic document used in cryptography.
 * Bandwidth || A rate measure of available or consumed data communication resources expressed in bits/second or multiples of it (kilobits/s, megabits/s etc.)
 * Circuit-Level Gateway || This applies security mechanisms when a TCP or UDP connection is established.
 * Data Packet || Formatted unit of data carried by a packet mode computer network. Computer communications links that do not support packets, such as traditional point-to-point telecommunications links, simply transmit data as a series of bytes, characters, or bits alone. When data is formatted into packets, the bitrate of the communication medium can be better shared among users than if the network were circuit switched. By using packet switched networking it is also harder to guarantee a lowest possible bitrate.
 * Dynamic Host Configuration Protocol (DHCP) || An auto configuration protocol used on IP networks. It allows a computer to be configured automatically, eliminating the need for intervention by a network administrator. It also provides a central database for keeping track of computers that have been connected to the network. This prevents two computers from accidentally being configured with the same IP address. ||
 * Extensible Authentication Protocol (EAP) || Authentication framework providing for the transport and usage of keying material and parameters generated by EAP methods. There are many methods defined by RFCs and a number of vendor specific methods and new proposals exist. EAP is not a wire protocol; instead it only defines message formats. Each protocol that uses EAP defines a way to encapsulate EAP messages within that protocol's messages.
 * Fail-Safe || Device or feature which, in the event of failure, responds in a way that will cause no harm, or at least a minimum of harm, to other devices or danger to personnel.

|| || || || || || || || || || ||  || || || || ||  || || ||
 * Failover || When the capability to switch over automatically to a redundant or standby computer server, system, or network upon the failure or abnormal termination of the previously active application, server, system, or network. Failover happens without human intervention and generally without warning, unlike switchover.
 * Firewall || A computer system or network that is designed to block unauthorized access while permitting authorized communications. It is a device or set of devices that is configured to permit or deny network transmissions based upon a set of rules and other criteria. Firewalls can be implemented in either hardware or software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets.
 * Firewire || A serial bus interface standard for high-speed communications and isochronous real-time data transfer, frequently used by personal computers, as well as in digital audio, digital video, automotive, and aeronautics applications.
 * File Transfer Protocol (FTP) || Known as a standard network protocol used to copy a file from one host to another over a TCP/IP-based network, such as the Internet. FTP is built on a client-server architecture and utilizes separate control and data connections between the client and server. FTP users may authenticate themselves using a clear-text sign-in protocol but can connect anonymously if the server is configured to allow it.
 * File Transfer Protocol Secure (FTPS) || Extension to the commonly used File Transfer Protocol (FTP) that adds support for the Transport Layer Security (TLS) and the Secure Sockets Layer (SSL) cryptographic protocols. FTPS should not be confused with the SSH File Transfer Protocol (SFTP), an incompatible secure file transfer subsystem for the Secure Shell (SSH) protocol. It is also different from Secure FTP, the practice of tunneling FTP through an SSH connection. ||
 * Hypertext Transfer Protocol (HTTP) || Networking protocol for distributed, collaborative, hypermedia information systems and functions as a request-response protocol in the client-server computing model. In HTTP, a web browser, for example, acts as a // client //, while an application running on a computer hosting a web site functions as a // server //. The client submits an HTTP // request // message to the server. The server, which stores content, or provides // resources //, such as HTML files and images, or generates such content as required, or performs other functions on behalf of the client, returns a response message to the client. A response contains completion status information about the request and may contain any content requested by the client in its message body.
 * IP Address || A numerical 32 bit number, that serves two principles host or a location.
 * Local Area Network (LAN) || Network that connects computers and devices in a limited geographical area such as home, school, computer laboratory or office building. The defining characteristics of LANs, in contrast to wide area networks (WANs), include their usually higher data-transfer rates, smaller geographic area, and lack of a need for leased telecommunication lines.
 * Man-in-the-Middle Attack (MITM) || Form of active eavesdropping in which the attacker makes independent connections with the victims and relays messages between them, making them believe that they are talking directly to each other over a private connection, when in fact the entire conversation is controlled by the attacker. The attacker must be able to intercept all messages going between the two victims and inject new ones, which is straightforward in many circumstances.
 * Networking || Refers to computers working together over a network as opposed to stand alone computers like laptops and home computers. ||
 * Network Interface Card (NIC) || Hardware component that interfaces to a computer network and allows computers to communicate over a computer network.
 * Packet Filter || Inspects each packet passing through the network and accepts or rejects it based on user-defined rules.
 * Packet Sniffer || Program or a piece of computer hardware that can intercept and log traffic passing over a digital network or part of a network. As data streams flow across the network, the sniffer captures each packet and, if needed, decodes and analyzes its content according to the appropriate RFC or other specifications.
 * Point-to-Point Protocol (PPP) || Data link protocol commonly used in establishing a direct connection between two networking nodes. It can provide connection authentication, transmission encryption privacy, and compression. ||
 * Proxy Server || Intercepts all messages entering and leaving the network.
 * Router || An electronic device that intercepts signals on a computer network.
 * Secure Sockets Layer (SSL) || Cryptographic protocols that provides communication security over the Internet. SSL encrypts the segments of network connections by using symmetric cryptography for privacy and a keyed message authentication code for message reliability. ||
 * Service Set Identifier (SSID) || Name that identifies a particular 802.11 wireless LAN. A client device receives broadcast messages from all access points within range advertising their SSIDs. The client device can then either manually or automatically—based on configuration—select the network with which to associate. The SSID can be up to 32 characters long. As the SSID displays to users, it normally consists of human-readable characters. However, the standard does not require this. The SSID is defined as a sequence of 1–32 octets each of which may take any value. ||
 * Spoofing || situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining an illegitimate advantage.
 * Traceroute (tracert) || Network tool for measuring the route path and transit times of packets across an Internet Protocol (IP) network.
 * Transfer Control Protocol (TCP) || Provides the service of exchanging data directly between two network hosts and provides reliable, ordered delivery of a stream of bytes from a program on one computer to another program on another computer. TCP is the protocol that major Internet applications rely on, applications such as the World Wide Web, e-mail, and file transfer. ||
 * Time To Live (TTL) || The limit on the period of time or number of iterations or transmissions in computer and computer network technology that a unit of data (e.g. a packet) can experience before it should be discarded. ||
 * Virtual Private Network (VPN) || Network that uses a public telecommunication infrastructure such as the Internet to provide remote offices or individual users with secure access to their organization's network. ||
 * Wardriving || Act of searching for Wi-Fi wireless networks by a person in a moving vehicle, using a portable computer or PDA.
 * Web Server || Makes it possible to be able to access content like web pages, or other data from anywhere as long as it is connected to the internet. The hardware part is what houses the content, while the software part is what makes the content accessible through the internet. The most common use of web servers are to host websites but there are other uses like data storage or for running enterprise applications. ||
 * Wi-Fi || Wireless networking technology that uses radio waves to provide wireless high-speed Internet and network connections and is any wireless local area network (WLAN).
 * Wired Equivalent Privacy (WEP) || Deprecated security algorithm for IEEE 802.11 wireless networks. ||
 * Wi-Fi Protected Access (WPA) || Certification program developed by the Wi-Fi Alliance to indicate compliance with the security protocol created by the Wi-Fi Alliance to secure wireless computer networks. The Alliance defined the protocol in response to several serious weaknesses researchers had found in the previous system, WEP (Wired Equivalent Privacy). ||
 * Wireless Local Area Network (WLAN) || Conects two or more devices using some wireless distribution method and usually providing a connection through an access point to the wider internet. This gives users the mobility to move around within a local coverage area and still be connected to the network.
 * WPA2 || Replaced WPA and implements the mandatory elements of 802.11i. In particular, it introduces CCMP, a new AES-based encryption mode with strong security. Certification began in September, 2004; from March 13, 2006, WPA2 certification is mandatory for all new devices to bear the Wi-Fi trademark. ||
 * Zones || [[image:http://www.shorewall.net/images/MultiZone1B.png width="378" height="297"]] ||