Category: Glossary

Zombie process

1. UNIX process that does not terminate. Must be removed by the kill command. 2. A compromised web server that is used as an attack launch point to launch an overwhelming number of requests toward an attacked web site, which...

Read More

Zigbee

A specification for a suite of high-level communication protocols using small, low-power digital radios based on an IEEE 802 standard for personal area networks.

Read More

Zero latency enterprise

The immediate exchange of information across geographical, technical, and organizational boundaries so that all departments, customers, and related parties can work together in real time.

Read More

Zero day attack

Exploitation by a hacker of a software vulnerability that is initially unknown to the manufacturer. Once the attack is discovered, the software developer works to close the vulnerability.

Read More

XML (Extensible markup language)

General-purpose markup language for creating special-purpose markup languages. It is a simplified subset ofstandard generalized markup language, capable of describing many different kinds of data. Its primary purpose is to...

Read More

X.25

1. Standard protocol for packet switched wide area network (WAN) communication developed by the International Telecommunication Union-Telecommunication (ITU-T) Standard Sector. 2. Interface between Data Terminal Equipment (DTE)...

Read More

WPA (Wi-Fi protected access)

A security scheme for wireless networks, developed by the networking industry in response to the shortcomings of Wired Equivalent Privacy (WEP). WPA uses Temporal Key Integrity Protocol (TKIP) encryption and provides built-in...

Read More

WWW (World Wide Web)

The web, or World Wide Web, is basically a system of Internet servers that support specially formatted documents. The documents are formatted in a markup language called HTML (HyperText Markup Language) that supports links to...

Read More
Loading