The distribution of responsibility for management of different parts of the communications network among different managing-software-products. It describes the organization of the management of a network. The three types of network management architectures are the centralized, distributed, and distributed hierarchical network management architectures.
A protocol that conveys information pertaining to the management of the communications network, including management operations from managers as well as responses to polling operations, notifications, and alarms from agents.
Software that provides the capabilities for network and security monitoring and managing the network infrastructure, allowing systems personnel to administer the network effectively from a central location.
A network begins carrying an excessive number of border gateway protocol (BGP) messages, overloading the router control processors and reducing the bandwidth available for data traffic.
A product such as a firewall or intrusion detection device that selectively blocks packet traffic based on configurable and emergent criteria.
Testing that is applicable to network protection devices.
It involves using a port scanner to identify all hosts potentially connected to an organization’s network, the network services operating on those hosts (e.g., FTP and HTTP), and specific applications. The goal is to identify all active hosts and open ports.
The protection of networks and their services from all natural and human-made hazards. This includes protection against unauthorized access, modification, or destruction of data; denial-of of-service; or theft.
Protecting network communications at the layer of the TCP/IP model that is responsible for routing packets across networks.
A worm that spreads by taking advantage of vulnerability in a network service associated with an operating system or an application system.
The total number of network devices managed within the network and all its subcomponents.
A passive technique that monitors network communication, decodes protocols, and examines headers and payloads for information of interest. Network sniffing is both a review technique and a target identification and analysis technique.
A direct connection between a sensor and the physical network media itself, such as a fiber optic cable.
The architectural layout of a network. The term has two meanings: (1) the structure, interconnectivity, and geographic layout of a group of networks forming a larger network and (2) the structure and layout of an individual network within a confined location or across a geographic area. Common topologies include bus (nodes connected to a single backbone cable), ring (nodes connected serially in a closed loop), star (nodes connected to a central hub), and mesh.
Network transparency is the ability to simplify the task of developing management applications, hiding distribution details. There are different aspects of transparency such as access failure, location, migration replication, and transaction. Transparency means the network components or segments cannot be seen by insiders and outsiders and that actions of one user group cannot be observed by other user groups. It is achieved through process isolation and hardware segmentation concepts.
It is a penetration technique in which different communication networks are linked to access an information system to avoid detection and traceback.
A worm that copies itself to another system by using common network facilities and causes execution of the copy program on that system.
They are artificial intelligence systems built around concepts similar to the way the human brain’s Web of neural connections to identify patterns, learn, and reach conclusions.
A computer system connected to a communications network and participates in the routing of messages within that network. Networks are usually described as a collection of nodes connected by communications links. A communication point at which subordinate items of data originate. Examples include cluster controllers, terminals, computers, and networks.
A policy statement that access controls cannot be changed by users, but only through administrative actions.