IPv6 transition mechanism for migrating from Internet Protocol version 4 (IPv4) to IPv6
tunneling protocol that encapsulates IPv6 packets on specially configured IPv4 links according to the specifications of RFC 4213
IP protocol number for 6in4 is 41, per IANA reservation
A
AAA
Authentication Authorization Accounting (AAA)
used to refer to a family of protocols that mediate network access
Authentication is used to verify the identity of a person
Authorization is used to verify the persons has the correct permissions
to access something
Accounting involves recording the persons
access, by logging their activities
AAR
After Action Report (AAR)
retrospective analysis on a given sequence of goal-oriented actions previously undertaken
Access Control
management of admission to system and network resources
grants
authenticated users access to specific resources based on company
policies and the permission level assigned to the user or user group
often includes authentication, which proves the identity
of the user or client machine attempting to log in
often includes authorization, which is the process of determining which level of access each user is granted
can include physical access control, such as a locked door, or security guard
can include information access control, such a network login
ACL
Access Control List (ACL)
permissions attached to an object that specify which users are granted
access to that object and the operations it is allowed to perform
each entry in an access control list specifies the subject and an associated operation that is permitted
ActiveX
An ActiveX control is an executable program that can be automatically delivered over the Internet where it usually runs within a browser.
AD
Active Directory (AD)
Windows OS
directory service that facilitates working with interconnected, complex
and different network resources in a unified manner
provides a common interface for organizing and maintaining information
related to resources connected to a variety of network directories
directories may be
systems-based
application-specific
network resources, like printers
serves as a
single data store for quick data access to all users and controls access
for users based on the directory's security policy
ADB
Android Debug Bridge (ADB)
command-line tool that lets you communicate with a device
facilitates a variety of device actions, such as installing and debugging apps
provides access to a Unix shell that you can use to run a variety of commands on a device
Agile Development
practices involve discovering requirements and developing solutions through the collaborative effort of self-organizing and cross-functional teams and end users
advocates adaptive planning, evolutionary development, early delivery, and continual improvement
encourages flexible responses to change
Aircrack
Aircrack-ng
suite of tools that provide capabilities for conducting RF communication monitoring and wireless network security auditing
network software suite consisting of a detector, packet sniffer, WEP and WPA/WPA2-PSK cracker and analysis tool for 802.11 wireless LANs
Works with any wireless network interface controller whose driver supports raw monitoring mode and can sniff 802.11a, 802.11b and 802.11g traffic
Runs under Linux, FreeBSD, macOS, OpenBSD, and Windows