Network Security Monitoring and Analysis Definitions

  • C

    CDDI (Copper Distributed Data Interface)

    For a local area network (LAN), CDDI (Copper Distributed Data Interface) is a standard for data transmission based on FDDI (Fiber Distributed Data Interface) that uses shielded twisted-pair (STP) or unshielded twisted pair (UTP) copper wire instead of fiber optic lines.

  • D

    darknet

    A darknet is a routed allocation of IP address space that is not discoverable by any usual means.

  • deep packet inspection (DPI)

    Deep packet inspection (DPI) is an advanced method of examining and managing network traffic.

  • Dynamic ARP Inspection (DAI)

    Dynamic ARP Inspection (DAI) is a security feature that verifies address resolution protocol (ARP) requests and responses in a network.

  • F

    FCAPS (fault-management, configuration, accounting, performance, and security)

    FCAPS is a network management framework created by the International Organization for Standardization (ISO). FCAPS categorizes the working objectives of network management into five levels. The five levels are:  fault-management (F), the configuration level (C), the accounting level (A), the performance level (P) and the security level (S).

  • FDDI (Fiber Distributed Data Interface)

    FDDI (Fiber Distributed Data Interface) is a set of ANSI and ISO standards for data transmission on fiber optic lines in a local area network (LAN) that can extend in range up to 200 km (124 miles).

  • N

    Nessus

    Nessus is an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools.

  • netstat

    Netstat is a common command line TCP/IP networking utility available in most versions of Windows, Linux, UNIX and other operating systems... (Continued)

  • P

    port mirroring (roving analysis port)

    Port mirroring is an approach to monitoring network traffic that involves forwarding a copy of each packet from one network switch port to another.

  • R

    rule base

    In the context of a computer server acting as a firewall, a rule base is a set of rules that govern what is and what is not allowed through the firewall.

  • S

    SYN scanning

    SYN scanning is a tactic that a malicious hacker (or cracker) can use to determine the state of a communications port without establishing a full connection.

-ADS BY GOOGLE

SearchSDN

SearchEnterpriseWAN

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

SearchITChannel

Close