See network access control (NAC).
Network Address Translation. See IP proxy.
The agency that developed the Trusted Computer System Evaluation Criteria (TCSEC) and the Trusted Network Interpretation Environmental Guideline (TNIEG).
An agency (formerly known as the National Bureau of Standards [NBS]) that has been involved in developing and supporting standards for the U.S. government for over 100 years. NIST has become involved in cryptography standards, systems, and technology in a variety of areas. It's primarily concerned with governmental systems, where it exercises a great deal of influence.
The U.S. government agency responsible for protecting U.S. communications and producing foreign intelligence information. It was established by presidential directive in 1952 as a separately organized agency within the Department of Defense (DoD).
See Network Control Protocol (NCP).
See National Computing Security Center (NCSC).
See Novell Distributed Print Services (NDPS).
See NetWare Directory Services (NDS).
A method of information dissemination based on passing information only to those who need to know it.
A protocol used to transport Network Basic Input Output System (NetBIOS) traffic in a LAN.
The upper-layer NetWare protocol that functions on top of IPX and provides NetWare resource access to workstations. See also Internetwork Packet Exchange (IPX).
A directory management service used to manage all of the resources in a network. In later versions, the acronym was changed to Novell Directory Services, and the service is now known as eDirectory. NDS provides a database of all of the network objects or resources.
A protocol that gathers routing information based on the link-state routing method. Its precursor is the Routing Information Protocol (RIP). NLSP is a more efficient routing protocol than RIP.
A component used to provide a NetWare server with additional services and functionality. Unneeded services can be unloaded, thereby conserving memory.
A group of devices connected by some means for the purpose of sharing information or resources.
The set of standards defined by the network for clients attempting to access it. Usually, NAC requires that clients be virus free and adhere to specified policies before allowing them on the network.
See IP proxy.
Storage, such as hard drives, attached to a network for the purpose of storing data for clients on the network. Network attached storage is commonly used for backing up data.
An intrusion prevention system that is network based. To prevent the intrusion, it must first detect it (thus making it a superset of IDS), and then act accordingly.
The native protocol of Windows PCs. It provides a 15-character naming convention for resources on the network. NetBIOS is a broadcast-oriented network protocol in that all traffic is available to all devices in a LAN. The protocol can be transported over NetBIOS Extended User Interface (NetBEUI), TCP/IP, or Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX).
The protocol Point-to-Point Protocol (PPP) employs for encapsulating network traffic.
A protocol that enables users to access files on remote computers as if the files were local.
A physical device that connects computers and other network equipment to the transmission medium.
The lowest level of the TCP/IP suite; it is responsible for placing and removing packets on the physical network.
The third layer of the OSI model, it is responsible for logical addressing and translating logical names into physical addresses. This layer also controls the routing of data from source to destination as well as the building and dismantling of packets. See also Open Systems Interconnection (OSI) model.
A single, centralized area for network monitoring and administrative control of systems.
The software enabling networking; NOS can be on a LAN or WAN.
A device that has access to the signaling on the network cable.
An approach to an intrusion detection system (IDS), it attaches the system to a point in the network where it can monitor and report on all network traffic.
See host-based IPS (H-IPS).
The protocol that Microsoft Windows–based operating systems use for authentication with remote access protocols.
See Network File System (NFS).
See network interface card (NIC).
A service that isn't necessary to keep the server operating at the expected level in its expected role.
A model intended to ensure that higher-level security functions don't interfere with lower-level functions.
Verifying (by whatever means) that data was seen by an intended party. It makes sure they received the data and can't repudiate (dispute) that it arrived.
The act of being alerted to an event.
A set of rules about what triggers notification.
A Novell-designed printing system that uses NetWare Directory Services (NDS), known as eDirectory in NetWare 6, to install and manage printers. NDPS supports automatic network printer installation, automatic distribution of client printer drivers, and centralized printer management without the use of print queues.
See National Security Agency (NSA).
3.138.102.114