Glossary

3DES (Triple DES) Newer version of DES that repeats the DES algorithm process three times.

A

acceptable use policy (AUP) Identifies network applications and uses that are acceptable to the organization as well as ramifications for violating the policy.

access attacks Attacks that exploit known vulnerabilities in authentication services, FTP services, and web services to gain entry to web accounts, confidential databases, and other sensitive info.

access control list (ACL) A series of commands that control whether a device forwards or drops packets based on information found in the packet header.

access layer Provides endpoints and users direct access to the network.

Address Resolution Protocol (ARP) Provides dynamic address mapping between ...

Get CCNA Cybersecurity Operations Companion Guide, First Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.