Читаем CISSP Practice полностью

The distribution of responsibility for management of different parts of the communications network among different managing-software-products. It describes the organization of the management of a network. The three types of network management architectures are the centralized, distributed, and distributed hierarchical network management architectures.

Network management protocol

A protocol that conveys information pertaining to the management of the communications network, including management operations from managers as well as responses to polling operations, notifications, and alarms from agents.

Network management software

Software that provides the capabilities for network and security monitoring and managing the network infrastructure, allowing systems personnel to administer the network effectively from a central location.

Network overload

A network begins carrying an excessive number of border gateway protocol (BGP) messages, overloading the router control processors and reducing the bandwidth available for data traffic.

Network protection device

A product such as a firewall or intrusion detection device that selectively blocks packet traffic based on configurable and emergent criteria.

Network protection testing

Testing that is applicable to network protection devices.

Network scanning tool

It involves using a port scanner to identify all hosts potentially connected to an organization’s network, the network services operating on those hosts (e.g., FTP and HTTP), and specific applications. The goal is to identify all active hosts and open ports.

Network security

The protection of networks and their services from all natural and human-made hazards. This includes protection against unauthorized access, modification, or destruction of data; denial-of of-service; or theft.

Network security layer

Protecting network communications at the layer of the TCP/IP model that is responsible for routing packets across networks.

Network service worm

A worm that spreads by taking advantage of vulnerability in a network service associated with an operating system or an application system.

Network size

The total number of network devices managed within the network and all its subcomponents.

Network sniffing

A passive technique that monitors network communication, decodes protocols, and examines headers and payloads for information of interest. Network sniffing is both a review technique and a target identification and analysis technique.

Network tap

A direct connection between a sensor and the physical network media itself, such as a fiber optic cable.

Network topology

The architectural layout of a network. The term has two meanings: (1) the structure, interconnectivity, and geographic layout of a group of networks forming a larger network and (2) the structure and layout of an individual network within a confined location or across a geographic area. Common topologies include bus (nodes connected to a single backbone cable), ring (nodes connected serially in a closed loop), star (nodes connected to a central hub), and mesh.

Network transparency

Network transparency is the ability to simplify the task of developing management applications, hiding distribution details. There are different aspects of transparency such as access failure, location, migration replication, and transaction. Transparency means the network components or segments cannot be seen by insiders and outsiders and that actions of one user group cannot be observed by other user groups. It is achieved through process isolation and hardware segmentation concepts.

Network weaving

It is a penetration technique in which different communication networks are linked to access an information system to avoid detection and traceback.

Network worm

A worm that copies itself to another system by using common network facilities and causes execution of the copy program on that system.

Neural networks

They are artificial intelligence systems built around concepts similar to the way the human brain’s Web of neural connections to identify patterns, learn, and reach conclusions.

Node

A computer system connected to a communications network and participates in the routing of messages within that network. Networks are usually described as a collection of nodes connected by communications links. A communication point at which subordinate items of data originate. Examples include cluster controllers, terminals, computers, and networks.

Nondiscretionary access controls

A policy statement that access controls cannot be changed by users, but only through administrative actions.

Noninvasive attack

Перейти на страницу:

Похожие книги

100 абсолютных законов успеха в бизнесе
100 абсолютных законов успеха в бизнесе

Почему одни люди преуспевают в бизнесе больше других? Почему одни предприятия процветают, в то время как другие терпят крах? Известный лектор и писатель по вопросам бизнеса нашел ответы на эти очень трудные вопросы. В своей книге он представляет набор принципов, или `универсальных законов`, которые лежат в основе успеха деловых людей всего мира. Практические рекомендации Трейси имеют вид 100 доступных для понимания и простых в применении законов, относящихся к важнейшим сферам труда и бизнеса. Он также приводит примеры из реальной жизни, которые наглядно иллюстрируют, как работает каждый из законов, а также предлагает читателю упражнения по применению этих законов в работе и жизни.

Брайан Трейси

Деловая литература / Маркетинг, PR, реклама / О бизнесе популярно / Финансы и бизнес