DoS - Denial-of-service: An attack that makes a network service unavailable to its intended users., DoT - DNS over Transport Layer Security: A protocol for encrypting DNS queries and responses to improve privacy and security., DR - Disaster Recovery: Strategies and processes for recovering from catastrophic events affecting IT systems., EAPoL - Extensible Authentication Protocol over LAN: A network port authentication protocol used in wired and wireless networks., EIGRP - Enhanced Interior Gateway Routing Protocol: A Cisco proprietary routing protocol used to automate routing decisions and configuration., EOL - End-of-life: The point at which a product is no longer supported or produced by the manufacturer., EOS - End-of-support: The date when a manufacturer will no longer provide support or updates for a product., ESP - Encapsulating Security Payload: A protocol used in IPSec to provide confidentiality, integrity, and authenticity of data packets., ESSID - Extended Service Set Identifier: The name of a wireless network in a multiple-access point configuration., EULA - End User License Agreement: A legal contract between a software provider and the user, outlining the terms of use., FC - Fibre Channel: A high-speed network technology primarily used for storage networking., FHRP - First Hop Redundancy Protocol: Protocols that provide redundancy for IP gateways, ensuring availability., FTP - File Transfer Protocol: A standard network protocol used to transfer files between a client and server., GDPR - General Data Protection Regulation: A regulation in the EU governing data protection and privacy., GRE - Generic Routing Encapsulation: A tunneling protocol used to encapsulate a wide variety of network layer protocols., GUI - Graphical User Interface: A visual interface allowing users to interact with a computer using graphical elements like icons and buttons., IaaS - Infrastructure as a Service: A cloud computing model that provides virtualized computing resources over the internet., IaC - Infrastructure as Code: The process of managing and provisioning computing infrastructure through machine readable scripts or code., IAM - Identity and Access Management: A framework of policies and technologies for ensuring that the right users have the appropriate access to technology resources., ICMP - Internet Control Message Protocol: A network protocol used for error handling and diagnostics in IP networks., ICS - Industrial Control System: Systems used to control industrial processes, including SCADA, DCS, and PLCs., IDF - Intermediate Distribution Frame: A distribution point for network cables and equipment within a building., IDS - Intrusion Detection System: A system that monitors network tra ic for suspicious activity and potential threats., IIoT - Industrial Internet of Things: The use of IoT technology in industrial sectors and applications., IKE - Internet Key Exchange: A protocol used to set up a secure, authenticated communication channel in IPSec., IP - Internet Protocol: A protocol responsible for addressing and routing packets of data across networks., IPAM - Internet Protocol Address Management: Tools and processes for planning, tracking, and managing IP address space., IPS - Intrusion Prevention System: A system that actively monitors and blocks potential threats to the network., IPSec - Internet Protocol Security: A suite of protocols used to secure Internet Protocol (IP) communications by authenticating and encrypting each IP packet., IS-IS - Intermediate System to Intermediate System: A routing protocol used to move information efficiently within a computer network, a variant of the link-state routing protocol.,

Leaderboard

Visual style

Options

Switch template

Continue editing: ?