<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>networking Archives - Jean-Christoph von Oertzen</title>
	<atom:link href="https://jeanchristophvonoertzen.com/infosec-glossary/category/networking/feed" rel="self" type="application/rss+xml" />
	<link>https://jeanchristophvonoertzen.com/infosec-glossary/category/networking</link>
	<description>Exploring the intersection of cybersecurity, psychology, and resilience.</description>
	<lastBuildDate>Mon, 12 May 2025 19:06:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://jeanchristophvonoertzen.com/wp-content/uploads/2020/10/favicon-4.png</url>
	<title>networking Archives - Jean-Christoph von Oertzen</title>
	<link>https://jeanchristophvonoertzen.com/infosec-glossary/category/networking</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>DPI</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/dpi</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/dpi#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Mon, 12 May 2025 19:06:34 +0000</pubDate>
				<category><![CDATA[networking]]></category>
		<category><![CDATA[firewall]]></category>
		<category><![CDATA[Network+]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1750</guid>

					<description><![CDATA[<p>DPI: Deep Packet Inspection Deep Packet Inspection (DPI) is a network management technology that analyzes the data packets transmitted over a network. Unlike traditional packet filtering methods that only examine the header of a packet, DPI inspects the entire packet, including the payload, which contains the actual data being transmitted. This allows network administrators to [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/dpi">DPI</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/dpi/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>RDAP</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/rdap</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/rdap#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sun, 23 Mar 2025 22:18:55 +0000</pubDate>
				<category><![CDATA[networking]]></category>
		<category><![CDATA[domain]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[standard]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1734</guid>

					<description><![CDATA[<p>RDAP: Registration Data Access Protocol The Registration Data Access Protocol (RDAP) is a protocol used to access registration data for domain names and IP addresses in a more secure and structured manner compared to its predecessor, the WHOIS protocol. RDAP provides a standardized way to retrieve information about domain name registrations, including details such as [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/rdap">RDAP</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/rdap/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CHAP</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/chap</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/chap#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Sat, 22 Feb 2025 23:23:20 +0000</pubDate>
				<category><![CDATA[networking]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[protocol]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1117</guid>

					<description><![CDATA[<p>CHAP : Challenge Handshake Authentication Protocol Challenge Handshake Authentication Protocol (CHAP) is a security protocol used to authenticate users over a network. CHAP involves a three-step process: the server sends a challenge to the client the client responds with a hashed value based on the challenge and its password the server verifies the response. This [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/chap">CHAP</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/chap/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>CARP</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/carp</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/carp#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 19 Feb 2025 15:55:56 +0000</pubDate>
				<category><![CDATA[networking]]></category>
		<category><![CDATA[Network+]]></category>
		<category><![CDATA[protocol]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1109</guid>

					<description><![CDATA[<p>CARP : Common Address Redundancy Protocol Common Address Redundancy Protocol (CARP) is a network protocol that allows multiple hosts on the same local area network to share a single virtual IP address. CARP provides redundancy and load balancing by enabling failover between hosts, ensuring continuous availability of services. When one host fails, another host can [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/carp">CARP</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/carp/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>BPDU</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/bpdu</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/bpdu#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 19 Feb 2025 15:41:33 +0000</pubDate>
				<category><![CDATA[networking]]></category>
		<category><![CDATA[protocol]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1105</guid>

					<description><![CDATA[<p>BPDU : Bridge Protocol Data Unit A Bridge Protocol Data Unit (BPDU) is a type of network message used in the Spanning Tree Protocol (STP) to maintain loop-free network topologies. BPDUs are exchanged between network switches to share information about their connections and the overall network topology. By utilizing BPDUs, switches can collaboratively determine the [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/bpdu">BPDU</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/bpdu/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ARP</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/arp</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/arp#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Wed, 19 Feb 2025 07:59:24 +0000</pubDate>
				<category><![CDATA[networking]]></category>
		<category><![CDATA[protocol]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1093</guid>

					<description><![CDATA[<p>ARP : Address Resolution Protocol Address Resolution Protocol (ARP) is a network protocol used to map an Internet Protocol (IP) address to a physical machine address (MAC address) on a local area network. When a device wants to communicate with another device on the same network, it uses ARP to translate the IP address into [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/arp">ARP</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/arp/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>ALG</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/alg</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/alg#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Tue, 18 Feb 2025 22:05:56 +0000</pubDate>
				<category><![CDATA[networking]]></category>
		<category><![CDATA[firewall]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1368</guid>

					<description><![CDATA[<p>ALG: Application Layer Gateway An Application Layer Gateway (ALG) is a network component that facilitates the secure passage of data between different applications or protocols. By operating at the application layer of the OSI model, ALGs can inspect, modify, and manage traffic based on the specific needs of the applications involved. They are often used [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/alg">ALG</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/alg/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>HSTS</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/hsts</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/hsts#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Mon, 20 Jan 2025 07:03:47 +0000</pubDate>
				<category><![CDATA[networking]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[Network+]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1503</guid>

					<description><![CDATA[<p>HSTS; HTTP Strict Transport Security [&#8230;] is a policy mechanism that helps to protect websites against man-in-the-middle attacks such as protocol downgrade attacks and cookie hijacking. (https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security) HSTS; HTTP Strict Transport Security [&#8230;] is a policy mechanism that helps to protect websites against man-in-the-middle attacks such as protocol downgrade attacks and cookie hijacking. (https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security)</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/hsts">HSTS</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/hsts/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>JEA</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/jea</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/jea#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Tue, 12 Nov 2024 09:33:09 +0000</pubDate>
				<category><![CDATA[networking]]></category>
		<category><![CDATA[identity management]]></category>
		<category><![CDATA[zero trust]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1480</guid>

					<description><![CDATA[<p>JEA: Just Enough Access aka &#34;least privilege&#34; Users get access [&#8230;] just enough to fulfill those tasks, limiting exposure to potential security threats. (https://www.veeam.com/blog/zero-trust-security.html) JEA: Just Enough Access aka &#34;least privilege&#34; Users get access [&#8230;] just enough to fulfill those tasks, limiting exposure to potential security threats. (https://www.veeam.com/blog/zero-trust-security.html)</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/jea">JEA</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/jea/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>JITA</title>
		<link>https://jeanchristophvonoertzen.com/infosec-glossary/jita</link>
					<comments>https://jeanchristophvonoertzen.com/infosec-glossary/jita#respond</comments>
		
		<dc:creator><![CDATA[jean-christoph]]></dc:creator>
		<pubDate>Tue, 12 Nov 2024 09:27:39 +0000</pubDate>
				<category><![CDATA[networking]]></category>
		<category><![CDATA[identity management]]></category>
		<category><![CDATA[zero trust]]></category>
		<guid isPermaLink="false">https://jeanchristophvonoertzen.com/?post_type=encyclopedia&#038;p=1478</guid>

					<description><![CDATA[<p>JITA: Just In Time Access [&#8230;] helps organizations provision access so that users only have the privileges to access privileged accounts and resources when they need it, and not otherwise any other times. Instead of granting always-on (or standing) access (or standing access), organizations can use JIT access to limit access to a specific resource [&#8230;]</p>
<p>The post <a href="https://jeanchristophvonoertzen.com/infosec-glossary/jita">JITA</a> appeared first on <a href="https://jeanchristophvonoertzen.com">Jean-Christoph von Oertzen</a>.</p>
]]></description>
		
					<wfw:commentRss>https://jeanchristophvonoertzen.com/infosec-glossary/jita/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
