Networks
The phrase networks describes two or more computer systems or electronics devices that are linked together. Network connections enable networked computers and devices to communicate with each other and share files, folders, data and more. Networks are essential to enterprise operation and have become increasingly common in the home as well.
From networking protocols and standards to network routing, security and management, our networks dictionary offers a glossary of key terms you need to know.
Sub-Categories
- .dam
- .dr
- 10 Gigabit Ethernet – 10GbE (IEEE 802.3ae)
- 1000Base-T (IEEE 802.3ab)
- 100Base-T (IEEE 802.3u) Fast Ethernet
- 10Base-2
- 10Base-T (Twisted Pair Ethernet)
- 10Base5
- 2-205 rule
- 3COM
- 4shared
- 5-4-3 rule
- 802.11 IEEE wireless LAN standards
- 802.11a
- 802.11ac
- 802.11ac Wave 2
- 802.11ad
- 802.11ah
- 802.11b
- 802.11g
- 802.11n
- 802.11r
- 802.16
- 802.1x
- @m
- @mm
- AAA
- AARP
- AAUI
- ABR
- AC/DC virus
- access
- access code
- access control
- access control entry
- accounting
- ACL - access control list
- Active Directory
- Active Directory Service Interfaces
- active impostor acceptance
- active reconnaissance
- ADC - Application Delivery Controller
- administrative domain
- ADN - Application Delivery Network
- ADSI
- adware
- AES
- AFP
- air gap
- Airframe
- AirWatch
- All-to-all broadcast
- Aloha
- Amazon EC2
- amplifier repeater
- Android mobile security
- ANSI Bomb
- anti-adware
- anti-malware
- AntiExe
- antivirus program
- AODV - Ad Hoc On-Demand Distance Vector
- AP - Access Point
- APPC
- Appending Virus
- Apple Watch Series 3
- AppleTalk
- ApplianSys
- application gateway
- Application Service Provider
- application sharing
- application virtualization
- APT - advanced persistent threat
- arbitrated loop
- ARCnet
- Armored Virus
- ARP - Address Resolution Protocol
- ARP spoofing
- AS
- ASIX Electronics Corporation
- asynchronous groupware
- ATM - Asynchronous Transfer Mode
- ATM OAM Ping
- Atom
- attenuation
- attenuation crosstalk ratio
- audit trail
- AUI
- authentication
- authorization
- Auto ID
- auto partitioning
- Auto-Negotiation
- autodiscovery
- AV Killer
- avahi
- Axerra Networks
- backdoor access (computing)
- backhaul
- backpressure
- Banker Trojan
- baseband
- bastion host
- BEC - business email compromise
- BECN
- Berkeley Packet Filter
- BGAN
- BGP
- Big Blue
- Big Red Switch
- Bimodal virus
- binder
- biometric engine
- biometrics
- bit bucket
- bit stuffing
- BizTalk Server
- black hole
- BlackHole Exploit Kit
- blended threat
- blind drop
- block
- blockchain
- Blowfish
- BLS
- bluebugging
- bluejacking
- bluesnarfing
- bogon
- Booter services
- bootkit
- BPDU - bridge protocol data unit
- BPL
- BPL repeater
- BRAS
- bridge
- broadband
- broadcast
- broadcast address
- broadcast storm
- brouter
- browser hijacker
- browser modifier
- buffer overflow
- burst
- bus network
- BYOA – Bring Your Own Apps
- BYOC - Bring Your Own Cloud
- BYON – Bring Your Own Network
- CAM - channel access method or computer-aided manufacturing
- CAMP - Cloud Application Management for Platforms
- CAN - campus-area network
- capture
- card skimming
- CARP - Common Address Redundancy Protocol
- carrier
- Castanet
- Cat-5
- Cat-5e
- Cat-6
- Cat-7
- CBR
- CCK
- CCNA
- CDDI - Copper Data Distribution Interface
- CDN - Content Delivery Network
- cell
- cell relay
- cellphone virus
- Cells in Frames
- central tunneling
- centralized network
- CERT/CC
- Certificate bandit
- certification authority
- challenge-response
- CHAP
- Check Point Software Technologies
- CHMOD
- choke packet
- chunk
- CIM
- cipher text
- CIR
- circuit switching
- Cisco Discovery Protocol
- Cisco EnergyWise
- Cisco Systems
- Class C network
- clickjack attack
- client-server architecture
- Clipper chip
- cloud
- cloud app
- cloud app policy
- cloud enablement
- cloud host
- cloud hosting
- cloud OS
- cloud provider
- cloud server hosting
- cloud service
- cloud-native app
- cluster virus
- clustering
- CMIP
- CNA
- coaxial cable
- Coinbit
- COLD - Computer Output to Laser Disk
- cold standby
- collapsed backbone
- collateral hacking
- collision
- collision detection
- collision domain
- command-line scanner
- Communication Streaming Architecture
- companion virus
- comparison
- composite applications
- computer business
- Computer Network Technician
- computer virus (virus)
- Conficker
- congestion
- congestion notification
- connection-oriented service
- connectionless
- connectionless service
- connectivity
- consumerization of IT
- content package
- Content Vectoring Protocol
- contention
- controller area network
- CopyCat Malware
- COR - central outdoor router
- countermeasure
- crack
- CRC - cyclic redundancy check
- credential
- credit freeze
- Cridex malware
- crimeware
- crosstalk
- cryptanalysis
- cryptocurrency
- cryptocurrency mining
- Cryptographic Service Provider
- cryptography
- CryptoLocker
- cryptomining malware
- CSCW
- CSMA/CA - Carrier Sense Multiple Access/Collision Avoidance
- CSMA/CD - Carrier Sense Multiple Access / Collision Detection
- CVE - Common Vulnerabilities and Exposures
- cyber crime
- cyber forensics
- Cyber Kill Chain
- cyber security boot camp
- cybersecurity
- D-Link
- DAC - Discretionary Access Control
- DAFS - Direct Access File System
- daisy chain
- DAN
- darknet
- Darrloz (Linux.Darrloz)
- DAS - Direct Attached Storage
- data at rest protection
- data integrity
- data mirroring
- Data Sending Trojan
- data vaulting
- datagram
- Datagram Congestion Control Protocol
- DCE
- DDoS attack - Distributed Denial of Service
- DEC
- decryption
- defacement
- default gateway
- Defense In-Depth
- DEN - directory enabled network
- DEP
- deploy
- DES
- Desktop-as-a-service (DaaS)
- Destructive Trojan
- Devicescape
- DHA
- DHCP Server Settings
- Dial-on-Demand Routing (DDR)
- dial-up access
- dialer
- dictionary attack
- diffusing update algorithm
- DigiNotar
- digital access and cross-connect system (DACS)
- digital certificate
- digital envelope
- digital loop carrier
- digital signature
- digital wallet
- DIIOP
- directory
- directory service
- diskless workstation
- Distribution Point
- DLC
- DLCI - data link connection identifier
- DLP – data loss prevention
- DLSw - Data-Link Switching
- DMI
- DMZ - demilitarized zone
- DNSBL
- DNSChanger
- Docker Datacenter
- domain
- domain controller
- domain migration
- domain name
- dongle
- Dorkbot
- DoS attack - Denial of Service attack
- downstream
- downtime
- DP
- Dragonchain
- Dridex malware
- drive-by download
- DRM
- dropper
- DSML
- DTCP-IP
- DTN - Disruption Tolerant Networking
- dual-homed host
- dual-ring topology
- DVMRP
- DWDM - Dense Wavelength Division Multiplexing
- dynamic NAT
- Dynamic Smart Cooling
- e-commerce trustmark
- e-discovery
- e-mail harvesting
- e-mail spoofing
- EAI - enterprise application integration
- eBGP
- ECML - Electronic Commerce Modeling Language
- EDB - Execute Disable Bit
- edge router
- edge switch
- EER - equal error rate
- EFS
- EFTPOS - Electronic Funds Transfer Point of Sale
- EGP
- egress traffic
- EIGRP - Enhanced Interior Gateway Routing Protocol
- electronic discovery
- Elina
- EMM - Enterprise Mobility Management
- encapsulation
- encryption
- encryption algorithm
- endpoint identifiers
- endpoint security
- ENIW - Ethernet Networking Interface (Web)
- enrollee
- enrollment
- enterprise
- Enterprise Collaboration Systems ECS
- ERD
- ESCON - Enterprise Systems Connection
- EtherLoop
- Ethernet
- Ethernet Audio/Video Bridging
- Ethernet Networking Interface
- Eucalyptus
- EV SSL
- evil twin
- exploit
- Extensible Threat Management - XTM
- extraction
- extranet
- E_Port
- Face ID
- facilities-based competition
- failover
- fairly fast packet filter
- fake news
- false acceptance
- FastIP
- FATA
- FC SAN
- FCIP
- FCoE - Fibre Channel over Ethernet
- FDDI - Fiber Distributed Data Interface
- FDE hard drive
- FECN
- Federal Internet Exchange
- Federated Identity Manager
- federated network identity
- Fibre Channel
- FICON
- file infecting virus
- File Replication service
- financial malware
- firewalking
- firewall
- Flame (malware)
- Flooding
- flow control
- Fog Computing
- forest
- FQDN
- Frame Relay
- FRR - false rejection rate
- FSMO
- FTP Trojan
- functional specification
- F_Port
- GameOver Zeus
- Gamimma (W32.Gammima.AG)
- gateway
- gateway antivirus
- GBIC
- geo-dispersed cluster
- GHOST Bug
- giant
- Gigabit Ethernet
- Gigabit Wi-Fi
- Gigle Networks
- global area network
- Global File System
- Gnutella
- goodput
- Google Dorking
- Google Fiber
- Google Ganeti
- Google Project Zero
- goto fail
- GRC - Governance, Risk, and Compliance
- greynet
- greyware
- groupware
- GTbot
- guest wireless network
- G_Port
- hack
- hack tool
- hacker
- hacktivism
- HAN - home area network
- Hand of Thief Trojan
- hashing
- HAVi
- HBA - host bus adapter
- HDCP - high-bandwidth digital-content protection
- HDLC - High-level Data Link Control
- heterogeneous network
- Hexadite
- HIPS
- hold down timer
- hole
- HomePlug
- HomePNA (HPNA)
- HomeRF - home radio frequency
- HoneyMonkey
- honeypot
- hop
- Host Channel Adapter
- hot potato routing
- hot standby
- hotspot
- HSRP
- HSSI - High-Speed Serial Interface
- hub
- HWID - Hardware Identification
- hybrid encryption
- hybrid routing protocol
- Hyper-convergence
- Hyperscale
- I/O - input/output
- I/O adapter
- IAM – Identity and Access Management
- iBGP
- IBM - International Business Machines
- ICF
- ICS - Internet connection sharing
- IDaaS - Identity-as-a-Service
- identification
- identity
- identity management
- IDF - intermediate distribution frame
- IDNX
- IEEE 802 standards
- iFCP
- IFTTT
- IGP - interior gateway protocol
WEBOPEDIA NEWS
Stay up to date on the latest developments in Internet terminology with a free newsletter from Webopedia. Join to subscribe now.