SoFunction
Updated on 2025-04-13

Professional vocabulary in cybersecurity

Access Control List (ACL) Access Control List
access token access token
account lockout account blockade
account policies accounting strategy
accounts  Account
adapter adapter
adaptive speed leveling adaptive rate level adjustment
Address Resolution Protocol(ARP) Address Resolution Protocol
Administrator account Administrator account
ARPANET APANET (the predecessor of the internet)
algorithm
alias alias
allocation, location
alias small application
allocation layer application layer
API Application Programming Interface
anlpasswd A proxy password checker similar to Passwd+
applications
ATM asynchronous delivery mode
attack
audio policy review strategy
auditing, auditing, supervision
back-end backend
Borde Boundary
Borde Gateway Border Gateway
breakabie, can be broken
breach breaks, violates
cipher Password
ciphertext ciphertext
Class A domain
CAlass B domain
CAlass C domain
classless addressing classless addressing
cleartext
CSNW Netware Customer Service
client client, client
client/server client/server
code code
COM port COM port (communication port)
CIX Service Provider
computer name Computer name
crack
cryptanalysis Password analysis
DLC Data Link Control
decryption decryption
database
default route default route
default share default share
denial of service denies service
dictionary attack dictionary attack
directory directory
directory replication directory copy
domain
domain controller domain name controller
domain name domain name
A domain name is actually the name of a computer connected to the network. Its function is as important as the person’s name and address required to send a letter. The domain name structure is as follows: computer host name, organization name, network name, and highest-level domain name. Domain names are expressed in words, which are easier to remember than IP addresses expressed in numbers. All levels of networks joining the Internet name the computers in this website in accordance with the DNS naming rules, and are responsible for completing the conversion of domain names to IP addresses during communication.
DNS Domain Name Server
DNS (Domain Name System, domain name system) refers to a directory service system that querys domain names or IP addresses on the Internet. When a request is received, it can translate the domain name of another host into an IP address, or vice versa. Most domain name systems maintain a large database that describes the correspondence between the domain name and the IP address, and this database is updated regularly. Translation requests usually come from another computer on the network, which requires an IP address for routing.
DDE Dynamic Data Exchange
DHCP Dynamic Host Configuration Protocol
encryption
EGP External Gateway Protocol
FDDI fiber distributed data interface
FAT file allocation table
FTP (File Transfer Protocol) File Transfer Protocol
filter  filter
firmware firmware
Flooding Flooding
GSNW NetWare Gateway Service
GDI (graphical device interface) Graphics device interface
GUI Graphical User Interface
HTML Hypertext Markup Language
HTTP Hypertext Transfer Protocol
IGP Internal Security
ICMP (Internet Control Message Protocol) Internet Control Message Protocol
ICMP is a TCP/IP protocol used to send control and error messages about IP datagram transmission. When an IP datagram cannot be transmitted
When you arrive at the destination, it may be because the destination machine is suspended or the information traffic is blocked, and the router may use ICMP to
The sender is notified to the failure message.
IGMP (Internet Group Management Protocol, Internet Group Management Protocol)
This TCP/IP protocol allows Internet hosts to participate in multicasting - a broadcast to a computer group
Effective means of information
IIS Information Server
IP (Internet Protocol) Internet Protocol
IRC Online Conversation
ISP Network Service Provider
IPX Internet Packet Protocol
IPC Interprocess Communication
IRQ Interrupt Request
IP address IP address
The IP address is called the network protocol address. It is a 32-bit address assigned to the host. It consists of 4 bytes and is divided into dynamic
stateIP地址和静stateIPTwo addresses。 Dynamic IP address refers to the different addresses obtained from each connection, and
A state IP address refers to an address where each connection is the same fixed address. Generally speaking, the address obtained by dialing by phone
All are dynamic, that is, the address obtained each time is different.
IP masquerade IP disguise
IP spoofing IP spoofing
LAN LAN
LPC local process call
NNTP Network News Transmission Protocol
PPP Point-to-Point Protocol
It is called Point to Point Protocol, which is a protocol formulated to adapt to users who cannot be on a network line to communicate with each other through the connection of a telephone line.
PDC Main Domain Controller
Telnet remote login
TCP/IP Transmission Control Protocol/Internet Protocol
The TCP/IP communication protocol mainly includes standards for network communication details on the Internet, as well as a set of network interconnection protocols and path selection algorithms. TCP is a transmission control protocol, which is equivalent to an item packing list, ensuring that data will not be lost during transmission. IP is an inter-network agreement, which is equivalent to the address and name of the consignee, ensuring that the data arrives at the designated location.
TFTP Normal file transfer protocol
TFTP is a simplified FTP protocol used by diskless computers to transmit information. It is very simple, so it can be cured on the hard drive and supports no authentication operations. TFTP is a very unsafe protocol.
* Horse * Horse
URL Unified Resource Locator
UDP User Datagram Protocol
VDM Virtual DOS Machine
UUCP is a long-standing file transfer protocol based on cats, and sometimes uses it to transmit Usenet news and email on the Internet, especially on sites with discontinuous networking. Nowadays, few sites provide anonymous UUCP to access files. As a file transfer protocol, only those users who do not use the Internet and use Cat use this method.
WWWW World Wide Web
WWW (Word Wide Web) is the latest information service on the Internet. It is an interactive browsing and search tool based on hypertext files. Users can use WWW to browse, pass and edit files in hypertext format on the Internet.
WAN WAN
virtual server virtual server
Usenet 
User Communication Network Usenet is the main source of information for network news servers. Usenet is a user communication network established by the public, using the Internet to exchange information but not entirely relying on the Internet for communication. Volunteers using Usenet jointly abide by some agreed network usage rules.
USER name Username
USER account User account
Web page Web page
OpenGL Open Graphics Language
ODBC Open Database Connection
PCI Peripheral Connection Interface
……………………………………………………………
authentication, authentication
Authorization Authorization
Back Office A software package from Microsoft
Back up Backup
backup browser backup browser
BDC backup domain controller
baseline
BIOS Basic Input/Output System
Binding Collected and Collection
bit bit bit, binary bit
BOOTP Boot Protocol
BGP Boot Gateway Protocol
Bottleneck Bottle Diameter
bridge bridge, bridge
browser Browser
browsing
channel channel, channel
CSU/DSU Channel Service Unit/Digital Service Unit
Checksum Checksum
Cluster, cluster
CGI Public Gateway Interface
CGI (Common Gateway Interface Public Gateway Interface is a program that can produce the same result or results change with user input. It can be written in an explanatory interface language or in a compilation programming language. CGI stipulates the interface protocol standard for the web server to call other executable programs. The web server realizes interaction with the web browser by calling CGI programs, that is, the CGI program accepts the information sent by the web browser to the web server, processes it, and sends the response result back to the web server and the web browser. CGI programs generally complete the processing of form data in web pages, database query, and integration with traditional application systems. Although CGI programs can be written in any programming language, CGI programs written in C have the characteristics of fast execution speed and high security.
CGI-based attack (based on CGI attack) It uses the fragile points of the public gateway interface to attack, usually with the help of the www site
crash The system suddenly fails and needs to be booted again
CD-ROM read-only disc
Component
data link data link
datagram datagram
default document default document
digital key system digital key control system
disk mirroring disk mirroring
distributed file system Distributed file system
data-driven attacks (data-driven attacks) rely on hidden or encapsulated data to pass through the firewall without being noticed.
DNS spoofing (Electronic spoofing of domain name servers) A method used by attackers to damage domain name servers can be achieved by spoofing DNS caches or internal attacks (usually, the attacker pretends to be a legitimate DNS server role)
DoS (hehe, it's not DOS, this is deniad of service, extremely denied service) When a user maliciously uses the network information server, he will refuse to provide services to legal users.
encrypted tunnel encrypted channel
enterprise network enterprise network
Ethernet Ethernet
External security External security
environment variable environment variable
fax modem fax cat
file attribute file attribute
file system file system
file file
form
fragments                                                              �
frame relay frame relay
firewall firewall
Firework is one or a group of systems that strengthen security protection between the Internet and Intranetp. A firewall can determine which internal services allow external access, which outsiders are licensed to access the allowed internal services, and which external services can be accessed by internal personnel. In order for the firewall to work, all information from and to the Internet must be in and out through the firewall.
The firewall only allows authorization information to pass, and the firewall itself cannot be penetrated.
gated daemon gated process (it seems to be an early UNIX path-seeking service)
gateway gateway
global account global account
global group global group
group
group account group account group account
group identifier group identifier
HCL Hardware Compatibility Table
hash scattered table
HPFS High-performance file system
Home directory Home directory
home page bamboo leaves
hop station, relay section
host host
hyperlink Hypertext link
highjacking hijacking the terminal is the control that the attacker captures another user session. This is rarely happening, and once it occurs, it indicates that the security of the target has been compromised. Actually, NetXRay does a good job at this point.
HTTPASSWD A system that uses passwords to protect sites on WWW (UNIX)
icon Icon
impersonation attack
index server index server
ISA Industry Standard Structure
Inherited Rights Filter Inherited Permission Filter
ISDN Comprehensive Business Digital Network
interactive user interactive user
intermediate system Intermediate
internal security internal security
Internet Explorer (IE) IBM's World Wide Web Browser
Internet server Internet server
Interpreter Interpreter
intranet, enterprise intranet
intruder intruder
IMAP A mail protocol
It is the abbreviation of Internet Message Access Protocal. IMAP provides a means to manage emails on a remote server. It is similar to the POP protocol, but has more functions than POP. It includes: only downloading the title of the email, creating multiple email addresses, and creating folders to save emails on the server.
Java Virtual Machine Java Virtual Machine
javascript A scripting language based on Java language
jack in A common spoken language used by hackers, meaning to undermine server security
kernel kernel
keys keys
keyspace keyspace
Keystroke Recorder Some tools for stealing other people's usernames and passwords with words
LAN Server LAN Server
Local security Local security
log*log, record
logging login
logoff Exit, logout
logical port logical port
logon registration
logon script login script
LFN long file name
logic bomb (logical bomb) A program or code that can cause system locking or failure.
mass browser Main browser
MAPI 
It is the abbreviation of Messaging Application Progrmming Interface. Microsoft and some other companies have developed MAPI that enables Windows applications to access multiple messaging systems from Microsoft Mail to Novell MHS. However, MAPI is limited to applications that work at the most common level, i.e., mail-aware application, which can exchange mail and data on the network.
member server member server member server
menu Menu
message
multilink multilink
MIME Multimedia Internet Mail Extension
MPR Multi-Protocol Router
multiprocessing Multiprocessing
Module
multihomed host multi-hole host
MUD 
The full English name of MUD is Multiple User Dimension, Multiple User Dialogue or Multiple User Dungeon, which is translated as "multi-player world", "multi-player dialogue" or "multi-player dungeon", commonly known as "Niba" game.
named pipes named pipes
NDS NetWare directory service
NetBEUI NetBIOS Extended User Interface
NetBIOS gateway NetBIOS gateway
NetWare Network Operating System (Sorry, I forgot that company developed it)
network
NetBIOS Network Basic Input/Output System
NDIS Network Driver Interface Specification
NetDDE Network Dynamic Data Exchange
NIC Network Interface Card
network layer network layer
Network Monitor A network monitoring program
network operating system network operating system
network printer
network security network security
network user network user
NFS Network File System
node node
npasswd UNIX's proxy password checker that filters potential passwords before submitting to a password file.
OSPF Open Shortest Path Priority Protocol
OSI Model Open System Interconnect Mode
out-of-band attack
packet filter
password password
path path
payload net load
PBX dedicated switch
PCS Personal Communications Service
peer peer
permission permission
plaintext
PPTP Point-to-point tunnel protocol
port port
priority
protocol
potential browser potential browser
POP Internet Email Agreement Standard
It is the abbreviation of Post Office Protocol and is the Internet email protocol standard. We can send and receive emails through hosts with POP service functions. The flaw of this protocol is that when you receive emails, all the letters are cleared from the server and downloaded to your local hard drive. Of course, there are also some client programs that can leave emails on the server or set files that exceed a certain size cannot be downloaded. As emails are in multimedia format, emails will become larger and larger. We hope to be able to flexibly grasp what files to download and when to download them. This requires the IMAP protocol. The current version of POP is POP3.
process
proxy
proxy server proxy server
Agent service is to proxy Web users to obtain information. Usually, when using WWW software to connect to remote terminals to obtain information, it must send a request signal and then transmit it back one by one by one. After the proxy setting is set, the signal required to data will be sent to the Proxy Server first. When Proxy Server gets the user's request, it will first go to the cache to find out if there is the same information. If there is, Proxy Server will directly pass the information to the user. If the cache has no information, Proxy Server will use the bandwidth that can be used on the network to retrieve the information from the remote platform, and store it in the cache and transmit it to the user. Even if the line is blocked, it is still faster than the user's own direct capture.
paseudorandom pseudorandom
phreaking refers to the process of controlling the telephone system
RAS Remote Access Service
Remote control Remote control
RPC remote procedure call
remote boot remote boot
route
router
routing
RIP Routing Information Protocol
routed daemon A UNIX path-seeking service that uses RIP
routing table routing table
Routing update protocol
RSA is a public key encryption algorithm. And RSA is perhaps the most popular.
script script
search engine search engine
SSL Security Sockets Layer
Secure Password
SID Security Identifier
sender sender
SLIP Serial Wire Internet Protocol
server server
server-based network server-based network
session layer session layer
share, share
share-level security share-level security
SMTP Simple Email Delivery Protocol
SNMP Simple Network Management Protocol
Site Site
SCSI Small Computer System Interface
snffer Error detector
snooping Investigate
standalone server standalone server standalone server standalone server
strong cipher strong password
stream cipher stream password
strong password
SQL Structured Query Language
subnet mask subnet mask
subdirectory Subdirectory
subnet subnet
swap file swap file
SACL System Access Control Table
S/Key is a one-time password system for secure connection. In S/Key, passwords are never sent over the network, so they cannot be stolen.
sniffer (sniffer) is a program that secretly captures data packets across the network. Hackers usually use it to try to steal usernames and passwords.
spoofing Any process involving pretending to be another user or host to provide unauthorized access to the target
time bomb (time bomb) refers to a program that waits for a specific time or event to be activated before it is activated, resulting in machine failure.
TCPDUMP is a practical tool for capturing data packets in UNIX and is often used to obtain detailed network communication records.
Traceroute A commonly used TCP program on UNIX, using a term to track the routing between the native and remote hosts.
T0, DS0 56 or 64kbps
T1, DS1 24-channel PCM digital phone, total speed is 1.544Mbps
T3, DS3 28 T1 channels, the work speed is 44.736Mbps
thin client thin client
thread
throughput throughput
transport layer Transport volume
Transport Protocol Transmission Protocol
trust
tunnel security encrypted link
vector of attack attack vector
Virtual directory
Virtual Machine Virtual Machine
VRML Virtual Reality Model Language
volume file set
vulnerability vulnerability
weak passwurd weak password
well-known ports General port
workstation workstation
X.25 A packet switching network protocol
zone transfer zone conversion