Network | Network Topology |
Node | Server |
Client | LAN |
WAN | Internet |
The arrangement of nodes and connections in a network. | A group of interconnected computers that can communicate and share resources with each other. |
A computer on a network that provides resources or services to other computers, called clients, on the network. | Any device connected to a network, such as a computer, printer, or router. |
A local area network, which is a network that covers a small geographical area, such as a home, office, or building. | A computer on a network that requests resources or services provided by the server. |
A global network of computer networks that use standard protocols to communicate with each other. | A wide area network, which is a network that covers a large geographical area, such as a city, country, or continent. |
Protocol | Bandwidth |
Latency | Reliability |
LAN | WAN |
PAN | Client-server |
The amount of data that can be transmitted over a network in a certain amount of time, usually measured in bits per second (bps). | A set of rules and standards that enable devices to communicate with each other in a network. |
The ability of a network to deliver data without errors or loss, usually measured in terms of uptime and downtime. | The amount of time it takes for data to travel from one point to another in a network, usually measured in milliseconds (ms). |
A Wide Area Network (WAN) connects computers and devices over a larger geographical area, such as a city, region, or country. | A Local Area Network (LAN) connects computers and devices in a limited geographical area, such as a home, school, or office building. |
A model in which the tasks of storing and processing information are divided between a client and a server computer. The client sends requests to the server for data or services, and the server responds to these requests. | A Personal Area Network (PAN) is a network of devices such as computers, smartphones, tablets, and other personal devices connected to one another. |
Peer-to-peer | Advantages |
Disadvantages | Bandwidth |
Latency | Topology |
Protocol | Router |
The benefits or positive aspects of a particular type of network, such as speed, reliability, and ease of use. | A model in which the tasks of storing and processing information are distributed among many computers on the network. Each computer on the network can act as a client or a server, and can share resources such as files and printers. |
The amount of data that can be transmitted over a network connection in a given amount of time, usually measured in bits per second (bps). | The drawbacks or negative aspects of a particular type of network, such as complexity, cost, and security challenges. |
The layout or structure of a network, including the physical and logical connections between devices and the arrangement of nodes and links. | The time delay between when data is sent and when it is received on a network, usually measured in milliseconds (ms). |
A device that connects multiple networks and directs data traffic between them, using protocols such as TCP/IP and DHCP. | A set of rules and standards for communication between devices on a network, specifying the format and timing of data transmission. |
Wired Connectivity | Wireless Connectivity |
Ethernet | Fiber Optic |
Coaxial | Networking Devices |
Radio Wave | Wi-Fi |
A type of computer network which uses radio waves to transmit data between devices. | A type of computer network which uses physical cables to transmit data between devices. |
A wired network technology that uses fiber cables to transmit data at high speeds. | A wired network technology that uses twisted pair cables to connect devices. |
Devices used to connect computers and other devices to a network, such as routers, switches, and hubs. | A wired network technology that uses coaxial cables to transmit data. |
A type of wireless technology that allows devices to connect to a network without the need for physical cables. | A type of wireless signal that is used to transmit data between devices. |
Bluetooth | Cellular Network |
Latency | Bandwidth |
Interference | Protocol |
TCP | IP |
A type of wireless network used to provide mobile connectivity to devices using cellular towers. | A type of wireless technology used to connect devices directly to each other over a short distance. |
The amount of data that can be transmitted over a network in a given amount of time. | The delay between the moment data is sent and the moment it is received. |
A set of rules that governs data communication over a network. | The disruption of a wireless signal caused by other electronic devices or physical barriers. |
Internet Protocol. A protocol responsible for routing data packets over a network. | Transmission Control Protocol. A protocol responsible for reliable data transmission over a network. |
HTTP | FTP |
SMTP | DNS |
SSL | UDP |
POP3 | IMAP |
File Transfer Protocol. A protocol used for transferring files between systems over a network. | Hypertext Transfer Protocol. A protocol used for accessing and transferring data on the World Wide Web. |
Domain Name System. A protocol used for translating domain names into IP addresses. | Simple Mail Transfer Protocol. A protocol used for sending and receiving email over a network. |
User Datagram Protocol. A protocol used for unreliable data transmission over a network. | Secure Sockets Layer. A protocol used for securing data transmission over a network. |
Internet Message Access Protocol. A protocol used for accessing email on a remote mail server. | Post Office Protocol version 3. A protocol used for retrieving email from a mail server. |
VoIP | Data transmission |
Layered protocol stacks | Stack |
TCP/IP model | Data link layer |
Network layer | Transport layer |
The process of transmitting data from one device to another over a communication channel, such as a network or the Internet. | Voice over Internet Protocol. A protocol used for transmitting voice and multimedia content over the internet. |
A collection of communication protocols organized into layers that operate cooperatively to transmit data. | A system that organizes communication protocols into a hierarchy of layers that operate cooperatively to transmit data. |
The layer of the TCP/IP model responsible for transmitting data between nodes on a network. | A four-layer protocol stack used to transmit data over the Internet or other networks. |
The layer of the TCP/IP model responsible for ensuring reliable transmission of data between devices. | The layer of the TCP/IP model responsible for routing data between networks. |
Application layer | Packet |
Routing | Internet Protocol (IP) |
Transmission Control Protocol (TCP) | Network Topology |
Bus Topology | Star Topology |
A unit of data transmitted over a network, consisting of a header and a payload. | The layer of the TCP/IP model responsible for providing services to applications that communicate over a network. |
A protocol used to transmit data over the Internet or other networks. | The process of finding the best path for data to travel between networks. |
The physical or logical layout of a network, including devices and connections that make up the network. | A protocol used to ensure reliable transmission of data over a network. |
A type of network topology in which all devices are connected to a central hub or switch. | A type of network topology in which all devices are connected to a common backbone or cable. |
Ring Topology | Mesh Topology |
Hybrid Topology | Scalability |
Reliability | Ease of Administration |
Cost | Speed |
A type of network topology in which all devices are connected to each other, forming a fully connected network. | A type of network topology in which all devices are connected in a circular manner to form a closed loop. |
The ability of a network to expand or handle increasing numbers of devices or users. | A type of network topology that combines two or more different types of topologies. |
The ease with which a network can be managed and maintained. | The ability of a network to function properly and consistently. |
The rate at which data can be transmitted over a network. | The expense involved in setting up and maintaining a network. |
Security | 3G |
4G | 5G |
CDMA | GSM |
LTE | Wi-Fi |
A mobile communication standard that offers internet and data connectivity at speeds of up to 2Mbps. | The measures taken to protect a network from unauthorized access or attacks. |
A mobile communication standard that offers internet and data connectivity at speeds up to 20Gbps, low latency, and the ability to connect multiple devices at once. | A mobile communication standard that offers internet and data connectivity at speeds of up to 100Mbps. |
Global System for Mobile Communications is a standard for cellular networks used by mobile phones based on time division multiplexing. | Code Division Multiple Access is a wireless communication standard that uses spread spectrum technology to increase capacity and improve call quality. |
A wireless networking technology that uses radio waves to provide high-speed internet and network connections to devices in close proximity. | Long-Term Evolution is a high-speed wireless communication standard for mobile devices that offers faster download and upload speeds compared to previous generations of cellular networks. |
Bluetooth | NFC |
Network | Roaming |
Frequency Spectrum | Computer network |
Topology | LAN |
Near Field Communication is a technology that allows wireless communication between devices at close proximity, enabling secure and fast data exchange, payments, and access control. | A wireless communication standard that enables short-range data exchange between devices such as smartphones, laptops, and wireless headphones. |
The ability of a mobile device to automatically connect to different cellular networks while traveling outside of the device's home network coverage area. | A system of interconnected devices and communication infrastructure that enable data exchange and resource sharing between devices and users. |
A group of interconnected computers and devices that are linked together to facilitate communication and resource sharing. | The range of electromagnetic frequencies used for wireless communication, including radio waves, microwaves, and infrared radiation. |
A local area network that connects computers and other devices within a limited geographical area, such as a home or office. | The physical or logical arrangement of computers and other devices on a network. |
WAN | Routing |
Firewall | Ethernet |
Wireless network | VPN |
Intranet | Extranet |
The process of forwarding data packets from one network to another network based on their destination addresses. | A wide area network that connects computers and other devices over a large geographical area, such as a city, country, or the world. |
A popular networking technology that uses a logical bus topology and supports data transfer rates of up to 10 Gbps. | A security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules and policies. |
A virtual private network that provides a secure and encrypted connection between two or more computers or networks over the Internet. | A type of network that does not use physical wires or cables and instead uses radio waves to transmit data. |
A private network that is accessible to authorized users outside of a specific organization or company, such as customers or suppliers. | A private network that is only accessible to authorized users within a specific organization or company. |
Bandwidth | Wired connectivity |
Wireless connectivity | Ethernet |
Router | Wi-Fi |
Bluetooth | NFC |
Wired connectivity refers to the method of connecting devices using physical cables. An example of wired connectivity is using an Ethernet cable to connect a computer to a router. | The maximum amount of data that can be transmitted over a network in a given time period, usually measured in bits per second (bps). |
Ethernet is a type of wired network technology that is commonly used to connect devices in a local area network (LAN). | Wireless connectivity refers to the method of connecting devices without the use of physical cables. An example of wireless connectivity is using Wi-Fi to connect a smartphone to the internet. |
Wi-Fi is a wireless network technology that allows devices to connect to a network without the use of physical cables. It is commonly used for internet access in homes and businesses. | A router is a device that connects multiple devices to a network, and directs traffic between them. Routers can provide both wired and wireless connectivity. |
NFC (Near Field Communication) is a short-range wireless communication technology that allows devices to exchange data by touching or bringing them close together. It is commonly used for mobile payments and data transfer between devices. | Bluetooth is a wireless communication technology that allows devices to connect and exchange data over short distances. It is commonly used for connecting devices such as headphones and speakers to a smartphone or computer. |
LAN | WAN |
IP address | Gateway |
Hotspot | Data Speed |
Bandwidth | Throughput |
A WAN (Wide Area Network) is a network of devices that are connected to each other over a large geographical area, such as different cities or countries. It typically uses wired connectivity such as fiber optic cables. | A LAN (Local Area Network) is a network of devices that are connected to each other within a limited area, such as a home or office. Wired and wireless connectivity can both be used in a LAN. |
A gateway is a device that connects different networks and directs traffic between them. It can provide access to the internet or other external networks. | An IP address is a unique numerical address that is assigned to each device connected to a network. It is used to identify and communicate with the device over the network. |
The rate at which digital data is transmitted over a communication channel, usually measured in bits per second (bps). | A hotspot is a physical location (such as a coffee shop or airport) where Wi-Fi is available for public use. Devices can connect to the internet through the hotspot using wireless connectivity. |
The actual amount of data that is transmitted over a communication channel in a given amount of time. | The maximum amount of data that can be transmitted over a communication channel in a given amount of time. |
Latency | Jitter |
Mbps | Gbps |
Data Rate | Upload Speed |
Download Speed | Ping |
The variation in the delay of packets as they are transmitted over a communication channel. | The time delay between the sending and receiving of data over a communication channel. |
Gigabits per second, a unit of measurement for data transmission speed equal to one billion bits per second. | Megabits per second, a unit of measurement for data transmission speed equal to one million bits per second. |
The speed at which data is transmitted from a computer or device to a network or server. | The rate at which data is transmitted over a communication channel, usually measured in bits per second (bps). |
A measurement of the time it takes for data to travel from one device to another over a network, usually measured in milliseconds (ms). | The speed at which data is transmitted from a network or server to a computer or device. |
Packet Loss | Network Protocol |
Ethernet® | Wi-Fi |
TCP/IP | HTTP |
HTTPS | FTP |
A set of rules and standards that enable devices to communicate with each other over a network. | The failure of one or more packets of data to reach their destination over a communication channel. |
A wireless networking standard that allows devices to connect to a network without needing cables. | A wired networking standard that uses cables to transmit data between devices in a local area network (LAN). |
A protocol used to transfer data over the internet, typically used to request and receive web pages in a web browser. | A set of protocols used for communicating data over a network, including the transmission control protocol (TCP) and internet protocol (IP). |
A protocol used for transferring files over a network, often used for uploading and downloading files from a website. | A secure version of HTTP that uses encryption to protect data transferred over the internet. |
POP3 | SMTP |
IMAP | Data Transmission |
Accuracy | Security |
Packet transmission | Computer networks |
A protocol used for sending email messages between mail servers. | A protocol used for receiving email messages from a mail server. |
The process of sending digital data from one device to another over a network. | A protocol used for accessing and manipulating email messages stored on a mail server. |
The protection of network data from unauthorized access, use, disclosure, or destruction. | The degree to which data transmitted over a network is received correctly by the receiving device. |
A group of interconnected computers that communicate with each other to share resources and information. | The process of dividing data into packets and transmitting them over a network to a destination computer. |
TCP/IP | Four-layer model |
Application layer | Transport layer |
Internet layer | Network access layer |
Functionality | Layered protocol stacks |
The TCP/IP model consisting of four layers: application, transport, internet, and network access. | The Transmission Control Protocol/Internet Protocol, a set of protocols used for communication on the internet and other networks. |
The layer of the TCP/IP model that provides reliable transmission of data between applications running on different computers. | The top layer of the TCP/IP model that handles application-specific protocols and data exchange between programs running on different computers. |
The bottom layer of the TCP/IP model that handles the physical transmission of data over a network, including the protocols used for data link and physical layers. | The layer of the TCP/IP model that handles addressing and routing of packets across multiple interconnected networks. |
The use of multiple layers of protocols in the TCP/IP model to break down the complex process of data transmission into smaller, more manageable components. | The specific roles and tasks performed by each layer in the TCP/IP model to ensure the reliable and efficient transmission of data over a network. |
Data transmission | Protocol |
3G | 4G |
5G | LTE |
HSPA | EDGE |
A set of rules and standards that govern the communication between devices on a network, ensuring that data is transmitted reliably and efficiently. | The process of sending data from one computer or device to another over a network, using protocols and standards to ensure the data is transmitted reliably and efficiently. |
The fourth generation of mobile communication standards, offering higher data transfer rates, lower latency, and better network efficiency than its predecessor, 3G. | The third generation of mobile communication standards, capable of providing faster data transfer rates and improved multimedia capabilities than its predecessor, 2G. |
Short for Long-Term Evolution, a standard for wireless communication of high-speed data for mobile phones and data terminals, based on the GSM/EDGE and UMTS/HSPA technologies. | The fifth generation of mobile communication standards, designed to offer faster data transfer rates, lower latency, enhanced connectivity, and improved network capacity compared to its predecessor, 4G. |
Short for Enhanced Data rates for GSM Evolution, a standard for wireless communication of high-speed data for mobile phones and data terminals, providing faster data transfer rates than GPRS, the 2.5G mobile technology. | Short for High-Speed Packet Access, a mobile communication protocol based on the 3G UMTS infrastructure, providing faster data transfer rates for mobile devices. |
GPRS | CDMA |
TDMA | frequency band |
latency | network capacity |
Local Area Network (LAN) | Wide Area Network (WAN) |
Short for Code Division Multiple Access, a digital cellular technology used for transmitting voice, data, and other digital content over wireless communication channels. | Short for General Packet Radio Service, a standard for wireless communication of high-speed data for mobile phones and data terminals, providing faster data transfer rates than the 2G mobile technology, GSM. |
A range of radio frequencies allocated for wireless communication by regulatory agencies, such as the Federal Communications Commission (FCC) in the United States. | Short for Time Division Multiple Access, a digital cellular technology that divides each frequency channel into time slots, allowing multiple users to share a single frequency channel. |
The maximum number of simultaneous connections that a communication network can support, determined by factors such as bandwidth, number of access points, and transmission speed. | The time delay between the initiation of a data transfer and the actual transmission of the data, measured in milliseconds (ms). |
A network that covers a large geographic area, such as a city or country, and connects multiple LANs. | A network of computers and devices in a small physical area such as a home or office building. |
Personal Area Network (PAN) | Client-server model |
Peer-to-peer model | Network topology |
Switch | Router |
Wireless network | Internet |
A networking model in which client devices request services or resources from a central server, which responds to those requests. | A network of personal devices such as smartphones, laptops, and tablets, typically connected via Bluetooth or Wi-Fi. |
The physical or logical layout of a network, including the devices, connections, and communication protocols. | A networking model in which multiple devices are connected without a central server, and each device can serve as a client or server. |
A network device that connects multiple networks, such as LANs and WANs, and is used to forward data between them. | A network device that connects multiple devices on a LAN and is used to forward data to its intended destination. |
A global network of networks that uses standard communication protocols to connect devices and share information. | A network that uses radio waves or infrared signals to connect devices without physical cables. |
Bandwidth | Latency |
Bus topology | Ring topology |
Star topology | Mesh topology |
Node | Communication line |
The delay between the transmission of data and its arrival at its intended destination, typically measured in milliseconds. | The maximum amount of data that can be transmitted over a network in a given period of time, typically measured in bits per second. |
A network topology in which all devices are connected in a circular, sequential fashion. Data is transmitted in one direction, and each device acts as a repeater to pass the transmission to the next device in the circle. | A network topology in which all devices are connected to a single communication line or cable. Data is transmitted sequentially, and all devices receive all transmissions, but only the intended recipient processes the transmission. |
A network topology in which each device is connected directly to every other device in the network. Data can be transmitted along multiple paths, which increases reliability and resiliency but can also be complex and costly to implement. | A network topology in which each device is connected directly to a central hub or switch. Data is transmitted through the hub, which can filter and direct transmissions based on their destination. |
A physical connection between two network devices, such as a cable, wire, or fiber optic line. | A device or element in a network, such as a computer, printer, switch, or hub. |
Transmission | Sequential transmission |
Circular transmission | Repeater |
Hub | Switch |
Cloud storage | Security issues |
A method of transmitting data in which bits are sent one after the other, serially, along a communication line or cable. | The process of sending data or information from one device to another over a network. |
A device that strengthens and amplifies a signal to extend its range or overcome attenuation or other signal loss. | A method of transmitting data in which each device in a network receives and repeats the transmission before passing it on to the next device in a circular pattern. |
A device that directs transmissions to their intended destination in a network. A switch analyzes the destination address of a transmission and sends it only to the device it is intended for, rather than broadcasting to all devices. | A device that acts as a central connection point for devices in a network. A hub receives transmissions sent by one device and relays them to all other devices connected to it. |
Problems or challenges that arise in relation to the protection of data in cloud storage, such as unauthorized access, data breaches, data loss, or hacking. | A method of storing data that involves storing it on remote servers that can be accessed via the internet. |
Encryption | Access control |
Backup | Data privacy |
Compliance | Risk management |
Data sovereignty | Service level agreement (SLA) |
Measures that limit who can access data stored in the cloud, such as passwords, biometrics, or two-factor authentication. | The process of encoding data so that it can only be read by an authorized party who has the decoding key. |
The protection of personal or confidential data from unauthorized or unintended access or sharing. | A process of copying and archiving data for the purpose of data recovery in the event of data loss or corruption. |
The process of identifying, assessing, and mitigating risks associated with the use of cloud storage, such as data loss, data breaches, or service interruptions. | The adherence to legal, regulatory, or industry standards and requirements regarding the security and privacy of data in cloud storage. |
A contractual agreement between a cloud storage provider and a customer that defines the terms and conditions of the service, including uptime guarantees, data backup and recovery, security measures, and service fees. | The concept that data is subject to the laws and regulations of the country or region where it is stored or processed, which may impact the security and privacy of data in cloud storage. |
Multi-factor authentication (MFA) | Data breach |
Technical Weaknesses | Cyber Attack |
Social Engineering | Phishing |
Shoulder Surfing | Pharming |
An incident where sensitive, protected, or confidential data is accessed, stolen, or exposed to unauthorized parties or systems. | A security mechanism that requires users to provide two or more forms of authentication, such as a password and a security token or a biometric measure, to access data in cloud storage. |
An attempt by hackers or cyber criminals to gain unauthorized access to a system or network for malicious purposes. | The vulnerabilities in software or hardware that can be exploited by cyber criminals to gain unauthorized access to a system or network. |
A type of social engineering attack where the attacker sends out emails or other messages that look legitimate but contain links or attachments that install malware or steal sensitive information. | The use of psychological manipulation to trick people into divulging sensitive information or performing actions that may not be in their best interest. |
A type of social engineering attack where the attacker redirects traffic to a fake website that looks legitimate but is designed to steal sensitive information. | A form of social engineering attack where the attacker looks over someone's shoulder to steal their login credentials or other sensitive information. |
Unpatched Software | USB Devices |
Digital Devices | Eavesdropping |
Malware | Firewall |
Network Security | Validation |
External storage devices that can be used to transfer data between computers, but can also be used to install malware or steal sensitive information if not properly secured. | Software that has not been updated to fix known vulnerabilities, which can be exploited by cyber criminals to gain unauthorized access to a system or network. |
The act of monitoring electronic communications, such as phone calls or emails, without the knowledge or consent of the parties involved. | Any electronic device that can be connected to a network, including computers, smartphones, tablets, and IoT devices. |
A security system that monitors and controls incoming and outgoing network traffic, and can be used to block unauthorized access to a network. | Software that is designed with malicious intent, such as viruses, trojans, or ransomware, which can be used to steal sensitive information or cause damage to a system or network. |
A process of checking and verifying data to ensure that it is correct and meets certain requirements. | The protection of computer networks from unauthorized access, use, modification, or destruction. |
Authentication | Digital signature |
Encryption | Decryption |
Access Control | Firewall |
Password | Physical Security |
An encrypted message that proves that a specific message was sent by a specific sender. | Verification of the identity of a person or process. |
The process of converting encrypted data back into its original form. | The process of converting information into a code to prevent unauthorized access. |
A program that controls access to a computer or network, based on predefined security rules. | A security technique that restricts access to resources to authorized users only. |
The protection of physical assets, including buildings, hardware, and equipment, from unauthorized access, theft, or damage. | A secret word or phrase that is used to gain access to a computer or network. |
Intrusion Detection | Public Key Infrastructure (PKI) |
Cloud storage | Data breaches |
Encryption | Virtual private network (VPN) |
Identity and Access Management (IAM) | Multi-factor authentication (MFA) |
A system that uses public and private keys to secure communications over a network. | A security technique that monitors network traffic and system activities for signs of unauthorized access or malicious activity. |
Unauthorized access or disclosure of sensitive information by an individual, group or software application that poses a threat to the confidentiality, integrity or availability of data. | A method of storing data on the internet that provides users with on-demand, scalable resources and eliminates the need for local servers or storage devices. |
A secure and private network connection that enables users to access resources over the internet while maintaining security, privacy and anonymity. | The process of converting plain text into coded, unintelligible text for secure transmission, storage or protection of data. |
A security mechanism that requires users to provide multiple forms of authentication such as a password, smart card or biometric verification to access resources. | A security framework that manages user identities, permissions and access to resources to ensure that only authorized individuals or systems can access sensitive data. |
Denial of Service (DoS) attacks | Service level agreement (SLA) |
Cloud provider | Data residency |
Data loss | Cloud audit |
Cyber Attack | Technical weaknesses |
A contract between a service provider and a customer that outlines the quality, availability and reliability of services to ensure that they meet the customer's needs and expectations. | A cyber attack that overwhelms a network or system with traffic or requests to disrupt its normal operation. |
The legal and regulatory requirements that dictate the physical location of data and ensure that it is stored in compliance with local laws and policies. | A company that provides cloud computing services to businesses or individuals, including infrastructure, platform or software as a service (IaaS, PaaS or SaaS). |
An independent review of cloud provider's security controls, processes, and policies to evaluate their effectiveness in protecting data and mitigating risks. | The accidental or intentional destruction, corruption or theft of data that can result in financial, reputational or legal consequences for businesses or individuals. |
Flaws or vulnerabilities in the hardware or software of a computer system, which can be exploited by attackers. | A form of attack that targets computer systems or devices via the internet. |
Behavior-based attacks | Phishing |
Shoulder Surfing | Pharming |
Unpatched software | USB devices |
Digital devices | Eavesdropping |
A type of social engineering attack where an attacker poses as a trustworthy entity to obtain sensitive information, such as login credentials or financial information. | Attacks that target human behavior or psychology, such as phishing or social engineering. |
A type of social engineering attack where an attacker redirects a victim's web traffic to a fake website to obtain sensitive information. | A type of social engineering attack where an attacker looks over a victim's shoulder to obtain sensitive information, such as a password. |
Portable storage devices that can be used to transfer data between computers, but can also be used to spread malware or viruses. | Software that has not been updated with the latest security patches, making it vulnerable to attacks. |
The act of listening in on private communication, such as phone calls or internet traffic, without the knowledge or consent of the parties involved. | Electronic devices that connect to the internet, such as smartphones or smart home devices, which can be vulnerable to attacks if not properly secured. |
Impact | Social engineering |
Vulnerability Identification Methods | Passive Reconnaissance |
Active Reconnaissance | Penetration Testing |
Ethical Hacking | Exploit |
The use of manipulation or deception to trick individuals into divulging sensitive information or performing actions that are harmful to themselves or others. | The effect or influence that an attack can have on personal or business data, including financial loss, identity theft, or reputational damage. |
The process of gathering information about a target system or network without actively engaging with it. | The process of identifying weaknesses or vulnerabilities in a computer system or network that attackers may exploit. |
The process of testing a computer system or network for vulnerabilities and weaknesses by simulating an attack. | The process of actively probing a target system or network to identify vulnerabilities and weaknesses. |
A piece of software or code that takes advantage of a vulnerability or weakness in a system or network. | The process of hacking into a computer system or network with permission, in order to identify vulnerabilities and weaknesses. |
Vulnerability Scanner | Network Policies |
User Policies | Commercial Analysis Tools |
Vulnerability Assessment | Exploit Framework |
Software Design Considerations | Audit Trail |
A set of rules and guidelines that dictate the proper use and security of a computer network. | A tool used to automatically scan a computer system or network for vulnerabilities and weaknesses. |
Software tools used to identify vulnerabilities and weaknesses in a computer system or network that are sold commercially. | A set of rules and guidelines that dictate the proper use and security of a computer system by its users. |
A set of tools and techniques used for finding and exploiting vulnerabilities in a computer system or network. | A process used to identify, quantify, and prioritize vulnerabilities in a computer system or network. |
A record of all events and actions that have been performed on a computer system to identify security breaches. | The factors to be considered during the design of software to protect it from cyber attacks. |
Securing Operating Systems | Secure Coding Principles |
Code Reviews | Modular Testing Techniques |
Network Security | Vulnerability Assessments |
Access Control | Encryption |
The guidelines and best practices for writing secure code that is free of vulnerabilities and easy to maintain. | The process of protecting an operating system from unauthorized access and malicious attacks. |
The methods used to test software modules to ensure that they are secure, reliable and meet the design specifications. | The process of reviewing and analyzing code to identify and remove bad programming practices and vulnerabilities. |
The process of identifying, evaluating, and prioritizing software vulnerabilities and potential threats. | The measures taken to protect a computer network from unauthorized access, attacks, and data theft. |
The process of encoding data and messages to protect them from unauthorized access and tampering. | The process of controlling and managing access to computer systems and resources to ensure that only authorized users can access them. |
Firewalls | Intrusion Detection |
Internet | IP Addressing |
DNS | Protocol |
Router | Gateway |
The process of monitoring and analyzing computer systems and networks for signs of unauthorized access or attacks. | A security software or hardware device that monitors and controls incoming and outgoing network traffic based on a set of rules. |
A unique numerical identifier assigned to each device connected to the internet, which enables the device to communicate with other devices on the internet. | A global network of interconnected computers that communicate with each other using standard communication protocols. |
A set of rules and standards that govern communication between devices on a network, ensuring that data is transmitted and received correctly. | A system that translates domain names into IP addresses, allowing people to access websites using human-readable names instead of IP addresses. |
A device or software application that enables devices to connect and communicate with other devices on different networks. | A device that connects different networks together and directs traffic between them. |
TCP/IP | Bandwidth |
Latency | Packet |
HTTP | HTTPS |
World Wide Web | Components |
The amount of data that can be transmitted over a network in a given time, usually measured in bits per second (bps). | A suite of communication protocols that govern the transfer of data over the internet, including the Transmission Control Protocol (TCP) and Internet Protocol (IP). |
A unit of data that is transmitted over a network, consisting of a header that contains information about the data and a payload that contains the actual data. | The delay or lag that occurs when data is transmitted over a network, often measured in milliseconds (ms). |
A secure version of HTTP that encrypts data transmitted over the internet to ensure privacy and security. | A protocol used to transfer data over the internet, typically used to access websites and other web-based services. |
The parts that make up the World Wide Web, such as web servers, URLs, ISP, HTTP, HTTPS and HTML. | A system of interlinked hypertext documents accessed through the internet. |
Web server | URL |
ISP | HTTP |
HTTPS | HTML |
Web browser | Hyperlink |
Uniform Resource Locator; a string of characters that provides a way to find and access resources on the internet, such as web pages, images, videos, etc. | A computer program that processes requests via HTTP, the basic network protocol used to distribute information on the World Wide Web. |
Hypertext Transfer Protocol; the main communications protocol used to exchange data on the World Wide Web. | Internet Service Provider; a company that provides internet access to customers. |
Hypertext Markup Language; a standard programming language used to create web pages and other information that can be displayed in a web browser. | Hypertext Transfer Protocol Secure; an extension of HTTP that encrypts and decrypts user page requests as well as the pages that are returned by the web server. |
A clickable link that takes you from one web page to another, or to a different part of the same page. | A software application used to access and display web pages and other content on the World Wide Web. |
Web page | Search engine |
IP Addressing Standards | IPv4 |
IPv6 | Binary |
Decimal | Octet |
A program that helps you find information on the World Wide Web by searching for keywords or phrases that you enter. | A document on the World Wide Web that can contain text, images, videos, audio, and other multimedia elements. |
A version of the Internet Protocol that is still widely used and supports up to 4.3 billion unique addresses. | A set of rules and guidelines used for assigning and managing IP addresses to devices on a network. |
A number system based on two digits (0 and 1) that is commonly used in computing and networking. | A newer version of the Internet Protocol that supports many more unique addresses than IPv4. |
A group of eight bits that is often used to represent one part of an IP address in binary form. | A number system based on ten digits (0-9) that is commonly used in everyday life. |
Subnet Mask | Default Gateway |
Network Address | Broadcast Address |
Private IP Address | Public IP Address |
Internet | IP Addressing |
A device or node on a network that serves as an access point to other networks or the Internet. | A number used to divide an IP address into network and host portions. |
The address used to send data to all devices on a network segment. | The identifier for a specific network that is part of an IP address. |
An IP address that is used to identify a device on the Internet and is publicly accessible. | An IP address that is reserved for use within a private network and is not accessible from the Internet. |
A numerical identification assigned to each device connected to the internet that is used to identify and communicate with that device. | A global network of connected computers that allows the sharing of information and communication through various protocols. |
IPv4 | IPv6 |
Packet | Protocol |
DNS | Domain |
TLD | WHOIS |
A 128-bit IP address format that is designed to replace IPv4 and provides a much larger address space for more devices to be connected to the internet. | A 32-bit IP address format that consists of four numbers separated by periods, with each number ranging from 0 to 255. |
A set of rules and standards that guide data transmission and communication between devices on a network. | A unit of data that is transmitted over a network, containing information such as the sender, receiver, and content of the communication. |
A unique name that identifies a website or other internet resource, consisting of a series of labels separated by periods. | Domain Name System is a hierarchical naming system designed to resolve human-readable domain names into IP addresses. |
A protocol for querying databases that store information about domain names, IP addresses, and other internet resources. | Top-Level Domain is the last part of a domain name, such as .com, .org, .edu, etc. |
Hyperlink | TCP/IP |
World Wide Web | Web server |
URL | ISP |
HTTP | HTTPS |
Transmission Control Protocol/Internet Protocol is the set of protocols that form the foundation of the internet and allow data transmission between devices. | A clickable link that takes the user to another webpage or resource, often indicated by underlined or differently formatted text. |
A computer that stores and delivers web pages to client devices upon request over the internet. | A global system of hypertext documents connected on the Internet, which enables the sharing of information and communication between users. |
An Internet Service Provider is a company that provides internet access to customers. | A unique address that identifies a webpage on the internet, consisting of a domain name, protocol, and path. |
Hypertext Transfer Protocol Secure is a protocol used for secure communication over the World Wide Web. | Hypertext Transfer Protocol is a protocol used for transferring data over the World Wide Web. |
HTML | Server-side script |
Client-side script | Webpage |
Web browser | Hyperlink |
IP Addressing | Standards |
A program on the web server that generates dynamic content in response to user requests. | Hypertext Markup Language is the standard markup language used to create web pages. |
A document or information resource that is displayed on the World Wide Web. | A program that runs on the client device, such as a web browser, and operates on the user's computer rather than on the web server. |
A link from a hypertext document to another location, such as a website. | A software application used to access web pages on the World Wide Web. |
Agreed-upon specifications that ensure devices on a network can communicate with each other. | A method of assigning a unique numerical label to each device on a network. |
IPv4 | IPv6 |
Binary | Octet |
Network ID | Host ID |
Subnet Mask | Classful Addressing |
The latest version of IP addressing, which uses a 128-bit address format and provides more unique addresses than IPv4. | A 32-bit IP address format that uses decimal notation, separated by periods, to represent four 8-bit numbers. |
A group of 8 bits representing a number in binary notation. | A numbering system that uses only two digits, 0 and 1, to represent values. |
The part of an IP address that identifies the specific device on a network. | The part of an IP address that identifies the network to which a device belongs. |
A method of IP addressing that divides addresses into predefined classes, with specific ranges of network and host IDs. | A number that defines which bits of an IP address represent the network ID and which bits represent the host ID. |
Classless Addressing | IP Telephony |
Modem | Router |
Switch | Wireless Access Point |
Internet access | Modulation |
A technology that allows voice communication over IP networks. | A more flexible method of IP addressing that allows for variable-length subnet masking and greater efficiency in address usage. |
A device that forwards data packets between computer networks, facilitating communication between devices on different networks. | A device that converts digital signals from a computer into an analog signal for transmission over telephone lines and vice versa. |
A device that allows wireless devices to connect to a wired network using Wi-Fi or other radio signals. | A device that connects devices together on a computer network, allowing them to communicate with each other efficiently. |
The process of converting digital signals into analog signals that can be transmitted over telephone lines or other communication channels. | The ability to connect to the internet and access online services such as email, web browsing, and online gaming. |
Broadband | ISP |
Ethernet | Wi-Fi |
DSL | Cable internet |
An Internet Service Provider that provides internet access to customers, typically through a wired or wireless connection. | A high-speed internet connection that is always on and can transmit large amounts of data at fast speeds. |
A wireless networking technology that uses radio waves to transmit data over short distances. | A standard for networking computers and other devices together using wired connections, typically over copper or fiber optic cabling. |
A type of internet connection that uses coaxial cable infrastructure to transmit data, typically providing high-speed internet access to residential and commercial customers. | A type of internet connection that uses existing telephone lines to transmit data, allowing for high-speed internet access without the need for expensive new infrastructure. |