Terms Beginning with A

A Record

A DNS record used to route a domain to an IP address.

Access Control List (ACL)

An authorization restriction mechanism that identifies users and groups about access permissions assigned to or rejected on an object.

Access Point

Alternatively, a base station and an access point, called a wireless router, is a wireless receiver that allows the user to wirelessly connect to a network or Internet.

Access Port

If the device to be connected to the switch port is a normal network user, such as a computer / network printer, the port is defined as Untag.

Access Server

An Access Server is a networked computer that is set up and responsible for granting rights to other computers that are not members of its network.

ACK

The process by which a connection is established through a protocol, the computer or device; is the confirmation message that the communication is completed.

Active Topology

The term active topology describes a network topology in which the signal is amplified at each step as it passes from one computer to another.

Acunetix

SQL Injection, Blind SQL Injection, Cross Site Scripting, CRLF Injection, Code execution, Directory Traversal, File Inclusion and Authentication bypass, such as a tool to find many types of web vulnerability reporting process.

Address Resolution Protocol (ARP)

The ARP protocol is used to find the MAC address of a known device on the network.

Adware

Software that automatically displays ads on your computer. When you use an application, ads will appear automatically on your computer.

AES

It is a symmetric encryption algorithm that uses 128 to 256 bit key dimensions.

Alert Situation

Any interruption in the organization reaches a critical level and when there is no solution to eliminate the interruption, this is the case.

Anonymizing Proxy

Allows the user to hide web activity.

Antenna

Wi-Fi is a wireless network that uses one of the IEEE 802.11 wireless standards to provide a wireless connection to a network.

Anti-Malware

Commonly used for detecting or eliminating many malware threats, including computer viruses, worms, trojans, malicious browser add-ons, adware and spyware.

Apple Talk Session Protocol

Apple Talk is used to communicate between clients and server computers.

Application Layer

The application layer is programs that will use the network connection. For example: HTTP, FTP, SSH…

Archie

It is a tool that allows the user to search the name of a particular file on all anonymous FTP servers registered to the user.

ASCII

It is a 7-bit character set based on the Latin alphabet.

Asymetric Digital Subscriber Line (ADSL)

Asymmetric Digital Abbreviation for Subscriber Line. It is the most used connection technique for internet connection. It is a modem technology that can provide more data on audio and video communication at the same time through standard copper telephone wires.

Asymetric Digital Subscriber Line 2 (ADSL2)

It is the ADSL standard that allows clients to reach higher data rates and connect to more remote clients.

Asynchronous Transfer Mode (ATM)

ATM is a network technology that enables the transmission of different types of data, such as audio, picture, video, into fixed data packets.

Authentication

In order to perform certain operations, it means that the previously defined information is verified and the user introduces himself to the system.

Axis

A fixed line that is referenced to measure length or to determine locations.

Class A IP Address

The first octet in the IP address is between 0 and 127, and the default subnet mask is 255.0.0.0. In other words, the first octet shows the network ID and the other three octets indicate the host ID.

The ARP protocol is used to find the MAC address of a known device on the network.

ePati Cyber Security Co.

Mersin Üniversitesi Çiftlikköy Kampüsü
Teknopark İdari Binası Kat:4 No: 411
Posta Kodu: 33343
Yenişehir / Mersin / TURKEY

Web: www.epati.com.tr
e-Mail: info@epati.com.tr
Tel: +90 324 361 02 33
Fax: +90 324 361 02 39