B C D M N P T V
__CONFIG_colors_palette__{"active_palette":0,"config":{"colors":{"f3080":{"name":"Main Accent","parent":-1},"f2bba":{"name":"Main Light 10","parent":"f3080"},"trewq":{"name":"Main Light 30","parent":"f3080"},"poiuy":{"name":"Main Light 80","parent":"f3080"},"f83d7":{"name":"Main Light 80","parent":"f3080"},"frty6":{"name":"Main Light 45","parent":"f3080"},"flktr":{"name":"Main Light 80","parent":"f3080"}},"gradients":[]},"palettes":[{"name":"Default","value":{"colors":{"f3080":{"val":"rgb(170, 204, 255)","hsl":{"h":216,"s":0.99,"l":0.83}},"f2bba":{"val":"rgba(168, 203, 255, 0.5)","hsl_parent_dependency":{"h":216,"l":0.83,"s":1}},"trewq":{"val":"rgba(168, 203, 255, 0.7)","hsl_parent_dependency":{"h":216,"l":0.83,"s":1}},"poiuy":{"val":"rgba(168, 203, 255, 0.35)","hsl_parent_dependency":{"h":216,"l":0.83,"s":1}},"f83d7":{"val":"rgba(168, 203, 255, 0.4)","hsl_parent_dependency":{"h":216,"l":0.83,"s":1}},"frty6":{"val":"rgba(168, 203, 255, 0.2)","hsl_parent_dependency":{"h":216,"l":0.83,"s":1}},"flktr":{"val":"rgba(168, 203, 255, 0.8)","hsl_parent_dependency":{"h":216,"l":0.83,"s":1}}},"gradients":[]},"original":{"colors":{"f3080":{"val":"rgb(23, 23, 22)","hsl":{"h":60,"s":0.02,"l":0.09}},"f2bba":{"val":"rgba(23, 23, 22, 0.5)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.5}},"trewq":{"val":"rgba(23, 23, 22, 0.7)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.7}},"poiuy":{"val":"rgba(23, 23, 22, 0.35)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.35}},"f83d7":{"val":"rgba(23, 23, 22, 0.4)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.4}},"frty6":{"val":"rgba(23, 23, 22, 0.2)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.2}},"flktr":{"val":"rgba(23, 23, 22, 0.8)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.8}}},"gradients":[]}}]}__CONFIG_colors_palette__
  • Jean-Christoph von Oertzen
  • Blog
  • Infosec encyclopedia

Infosec encyclopedia Category

networking

There are a lot of abbreviations in the Infosec field. So I took note of some abbreviations and definitions. And now I share them for the category "networking" with you as well. 

BPF

Read More
BPF

C2

Read More
C2

CCMP

Read More
CCMP

CNI

Read More
CNI

DoH

Read More
DoH

DoT

Read More
DoT

MAC

Read More
MAC

NSM

Read More
NSM

PCAP

Read More
PCAP

PDU

Read More
PDU

TKIP

Read More
TKIP

VPS

Read More
VPS
Load More

Search encyclopedia

Encyclopedia categories

  • hardware
  • lingo
  • networking
  • policies, laws, regulations
  • principles, frameworks and best practices
  • vulnerabilities, threats, attacks and countermeasures

Most popular tags

    blue team cryptography intrusion detection AppSec ransomware OT phishing framework C2 social engineering privacy incident response threathunting vulnerability Network+ email marketing german malware webinar takeaway automation BSI IT-Grundschutz red teaming policy identity management webapp
trending

  • 5 tips I wish I had before passing my CompTIA Network+ exam
  • “BSI IT-Grundschutz Praktiker” certificate
  • Webinar takeaway: Pretty Little Python Secrets (Episode 2)
  • Webinar takeaway: DevOps – Die Philosophie der modernen Softwareentwicklung
  • Webinar takeaway: Getting Started with Burp Suite & Webapp Pentesting
about the author

I'm a seasoned IT-professional but also a student in Cybersecurity blogging primarily about what I learn in this field

Connect

__CONFIG_colors_palette__{"active_palette":0,"config":{"colors":{"f3080":{"name":"Main Accent","parent":-1},"f2bba":{"name":"Main Light 10","parent":"f3080"},"trewq":{"name":"Main Light 30","parent":"f3080"},"poiuy":{"name":"Main Light 80","parent":"f3080"},"f83d7":{"name":"Main Light 80","parent":"f3080"},"frty6":{"name":"Main Light 45","parent":"f3080"},"flktr":{"name":"Main Light 80","parent":"f3080"}},"gradients":[]},"palettes":[{"name":"Default","value":{"colors":{"f3080":{"val":"rgb(23, 23, 22)"},"f2bba":{"val":"rgba(23, 23, 22, 0.5)","hsl_parent_dependency":{"h":60,"l":0.09,"s":0.02}},"trewq":{"val":"rgba(23, 23, 22, 0.7)","hsl_parent_dependency":{"h":60,"l":0.09,"s":0.02}},"poiuy":{"val":"rgba(23, 23, 22, 0.35)","hsl_parent_dependency":{"h":60,"l":0.09,"s":0.02}},"f83d7":{"val":"rgba(23, 23, 22, 0.4)","hsl_parent_dependency":{"h":60,"l":0.09,"s":0.02}},"frty6":{"val":"rgba(23, 23, 22, 0.2)","hsl_parent_dependency":{"h":60,"l":0.09,"s":0.02}},"flktr":{"val":"rgba(23, 23, 22, 0.8)","hsl_parent_dependency":{"h":60,"l":0.09,"s":0.02}}},"gradients":[]},"original":{"colors":{"f3080":{"val":"rgb(23, 23, 22)","hsl":{"h":60,"s":0.02,"l":0.09}},"f2bba":{"val":"rgba(23, 23, 22, 0.5)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.5}},"trewq":{"val":"rgba(23, 23, 22, 0.7)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.7}},"poiuy":{"val":"rgba(23, 23, 22, 0.35)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.35}},"f83d7":{"val":"rgba(23, 23, 22, 0.4)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.4}},"frty6":{"val":"rgba(23, 23, 22, 0.2)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.2}},"flktr":{"val":"rgba(23, 23, 22, 0.8)","hsl_parent_dependency":{"h":60,"s":0.02,"l":0.09,"a":0.8}}},"gradients":[]}}]}__CONFIG_colors_palette__

Copyright 2023 Jean-Christoph von Oertzen - Privacy policy - Imprint