Related Concepts

  • NIC: Network Interface Card, a hardware component that enables a computer or device to connect to a network, allowing communication over wired or wireless connections

  • Routing: Process of data traveling through a network

  • ISP: Internet Service Provider, a company or organization that provides access to the Internet for individuals, businesses, and other entities

  • Public address: Used to identify the device on the Internet, is given by the ISP

  • Private address: Used to identify a device amongst other devices

  • MAC address: Media Access Control, is a hardware address set by the manufacturer in network interface cards. It's a twelve-character hexadecimal number. The first six characters represent the company that made the network interface, and the last six are unique numbers

  • IP address: Internet Protocol address, identifies a host on a network and can't be active simultaneously more than once within the same network. It's formed by 4 octets of bits, each octet represents a number in the range 0-255

  • LAN: Local Area Network

  • Ping: Ia a way to send ICMP packets to determine the performance of a connection between devices

  • SCP: Secure File Copy, transfer files between two computers using the SSH protocol to provide authentication and encryption

  • Switch: Device designed to aggregate multiple other networking-capable devices using ethernet. Sends the package only to the intended target, thus reducing network traffic

  • Repeaters: Have the same function as the switch but replay the sent information to all devices connected to it

  • Router: Connects networks and passes data between them

  • Network Address Identifies the start of the actual network

  • Host Address: Used to identify a device on the subnet

  • Default Gateway: A special address assigned to a device on the network that is capable of sending information to another network

  • Encapsulation: The process of data getting added information details as it goes through every layer before getting sent

  • De-Encapsulation: Reverse the process of encapsulation for received data

  • TLD: Top-level Domain server, lower-level servers whose work is to get requests from DNS servers to manage it. Each TLD is related to an extension such as .com and only manages requests with its own established extension

  • Authoritative name servers: Get requests from TLD servers, store DNS records for domains directly, and send a response with the relevant information back to you, allowing connection to the IP address behind the domain requested

  • TTL: Time to Live, tells how much time the information of a request stored in the local cache is being considered valid, before asking the answer to the server again

  • Port: Constructs used to direct traffic to the right application on a server. There are 65535 ports available on every computer, and the first 1024 of them are well-known, used for specific protocols

  • RFC 793: Norm that establishes the right behavior for TCP protocol

  • RFC 3912: Norm that establishes the right behavior for WHOIS protocol

  • RFC 5322: Norm that establishes the right behavior for SMTP protocol

  • Ping Sweep: Send an ICMP packet to each possible IP address for a specified network to map it

  • CIDR: Classless Inter-Domain Routing, useful notation for identifying subnets. It takes the IP address and adds a netmask at the final part of the address Ex: In 192.168.34.23/24 the /24 represents the mask 255.255.255.0

  • TUN: Abbreviation for TUNnel, simulates a network layer device and operates in layer 3 carrying IP packets

  • SSID: Service Set Identifier, the name given to a network to be recognized from other networks nearby

  • Firewall: Look deeper into network traffic and identify malicious behavior to block it

    • Network layer: Filters communications based on source and destination IP addresses

    • Transport layer: Filters communications based on source and destination data ports, as well as connection states

    • Application layer: Filter communications based on an application, program, or service

    • Context-Aware layer: Filter communications based on the user, device, role, application type, and threat profile

    • Proxy: Filters web content requests like URLs, domain names, and media types

    • Reverse proxy: Placed in front of web servers, reverse proxy servers protect, hide, offload, and distribute access to web servers

    • NAT: Network Acces Translation, hides or masquerades the private addresses of network hosts

    • Host-Based: Filters ports and system service calls on a single computer operating system

  • VPN: Virtual Private Network, technology that establishes a secure connection between a user's device and a remote server by creating a tunnel where data is encrypted

  • Antivirus: Uses signatures or behavioral analysis of applications to identify and block malicious code

  • NTLM: New Technology Lan Manager, collection of authentication protocols as a challenge-response used to authenticate a client to a resource on an Active Directory domain

  • Pivoting: Use an already compromised machine to jump or get access to other machines of the same network

  • Tunneling: Consists of encapsulating a network protocol over others to create an information tunnel on a computer network

  • NAC: Network Access Control, is a security system that ensures that only authorized and compliant devices are granted access to the network

    • DAC: Discretionary access control, enables users to manage access to their resources by granting resource owners the responsibility of controlling access permissions.

    • MAC: Mandatory access control, determine resource access based on the resource's security level and the user's security level or process requesting access

    • RBAC: Role-based access control, users are assigned roles based on their job responsibilities or other criteria, and each role is granted a set of permissions

  • Monitoring: Capturing, analyzing, and interpreting network traffic to identify security threats, performance issues, and suspicious behavior

  • Workgroup: Is a LAN peer-to-peer network that can support a maximum of 10 hosts in the same subnet in Windows, and identifies an arbitrary collection of computers and their resources on an SMB network

  • LLMNR: Link-Local Multicast Name Resolution, is a network protocol that seeks to resolve computer names and/or domains on a LAN network, without requiring any configuration

  • CIFS: Common Internet File System protocol is a cross-platform, transport-independent protocol that provides a mechanism for client systems to use file and print services made available by server systems over a network, considered a specific version of the SMB protocol

  • Relay server: An SMTP server that is known, trusted, and verified by all others

  • Community strings: Passwords used to determine whether the requested information can be viewed or not

Last updated