| A | B |
| I. P. Address | identify hosts |
| Binary number | 1, and 0's base 2 |
| Boolean | 1=true or 0=false |
| Kilobytes | 1024 bytes |
| Bit | one digit 1 or 0 |
| Byte | 8 digits made of 1s and 0s |
| Megabytes | 1,048,576 bytes |
| Gigabytes | 1,073,741,824 bytes |
| the Internet Assigned Numbers Authority(IANA) | Assigns IP Addresses |
| Netblocks | large number of IP addresses assigned to an ISP |
| ISP | Provides Internet service to many customers |
| Routing table | data base of known networks |
| Convergence | reconstruction of the networks routes to avoid a downed router |
| DHCP | assigns IP addresses to hosts on a network |
| Gateway | allows communication between hosts on different networks |
| Classiful IP addressing | Net blocks assigned by size |
| Subnet mask | splits large networks into smaller networks using binary blocking of part of the address |
| Classless interdomain routing (CIDR) | ISP increased the number of IP addresses by subnet masking |
| supernetting | increasing size of network through subnet mask |
| subnetting | breaking network into smaller networks using subnet mask |
| Spyware | spy on a users web browsing habits, monitor e-mail communications and keystrokes. |
| Trojan Horses | once opened by users open backdoor programs |
| Worms | scan internet addresses to look for systems vulnerabilities to infect |
| Malware | rouge applications, malicious software |
| Direct hacking | attempt to penetrate a computer system from the Internet |
| payload | program or file delivered to a vulnerable system by a worm or virus |
| ICS | hides existence of computer systems by sharing a connection with the Internet |
| NAT | Translates local network addresses to hide existance from Internet attackers |
| Packet filtering | inspecting packet headers to determine if they are allowed to enter the network |
| Stateful Packet filtering | packets leaving the network are logged and only packets that are expected are allowed on the network |
| exceptions | rules that allow some inbound traffic to enter |
| Allowed traffic | packet allowed past the firewall |
| logging | history of acceptance and rejection events |
| Firewall | blocks external connections from system ports |
| ICMP | maintenance protocol that reports errors and allows connectivity-ping, tracert, etc. |
| WMI(Windows Management Instrumentation | provides hook for 3rd party firewall vendors |
| IDS (Intrusion Detection system) | Pfirewall.log file stored in %SYSTEMROOT%logs attempts to connect to web server |
| 403 error | can indicate someone is attempting to crack a password |
| 404 error | may indicate worm attempting to locate vulnerable web server apps |
| DNS | database that maps domain names to IP addresses |