Lexikon 2 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 2 2FA A Abstraktion ACID ACL (Access Control List) Active Directory Ad-hoc-Netzwerk Agile (Softwareentwicklung) API (Application Programming Interface) APIPA ARP ARP-Cache ARPANET ASIC Authentifizierung Autonomes System (AS) Autorisierung AWS Azure B Backpropagation Backup Bandbreite Bandsicherung Bare Metal BGP (Border Gateway Protocol) Binärpräfix Bitmap Bluetooth Bridge Broadcast-Adresse Brute-Force-Angriff BSI IT-Grundschutz BSI Schutzbedarfsanalyse BYOD C C# (Programmiersprache) Cache CAPTCHA CDN (Content Delivery Network) Checksum (Prüfsumme) CIDR CLI (Command Line Interface) Client-Server-Modell Cluster CMS CNN Compiler Container CPU Cronjob CRUD (Create, Read, Update, Delete) CSMA/CA CSMA/CD CSS (Cascading Style Sheets) D DDoS Deadlock (Verklemmung) Deep Learning Dezimalpräfix DHCP DMZ DNS DNSSEC Docker (Container-Plattform) DoS DSGVO E EIGRP End-to-End VPN End-to-Site-VPN ERP Ethernet Ethernet Frame F Failover Flusskontrolle FQDN Frame Fremdschlüssel FTP G GAN Garbage Collection GARP Gateway Generative KI Git GPT Gradient Descent GUI H HDD HDMI Heap HTTP Hub Hypervisor I IaaS ICMP IDS IETF IGMP IHK IMAP Incident Index (Datenbank) Informationssicherheit IOPS IPv4 IPv6 ISMS ISO ISO 9001 ISO 27001 ITIL J Java (Programmiersprache) Jitter JSON (Softwareentwicklung) JWT (JSON Web Token) K Kanban Kapselung Kernel Keylogger Kollisionsdomäne Kompression Kubernetes L LAMP-Stack LAN Lastenheft Latenz LDAP LEMP-Stack Lichtwellenleiter Link Aggregation Linked List Linux LLM Load Balancing M MAC-Adresse Malware MAN Man-in-the-Middle MFA Microservices MQTT MTU Multicast Multithreading MVC MVP MVVM N NAS NAT NetBIOS Netzklasse Netzwerk-ID Netzwerkkarte Neuronales Netz NFC NLP Normalisierung NoSQL NPU NTP O OAuth OCR OIDC Orchestrierung OSI-Modell OSPF P PaaS PAT PCIe PDCA-Zyklus Pentesting Pflichtenheft Phishing PHP (Programmiersprache) Ping PKCE Polymorphie POP3 Port-Weiterleitung PPP PPPoE Primärschlüssel Prompt Proxy Pseudocode Q Quality of Service Queue R Race Condition RADIUS RAG RAID Ransomware Reinforcement Learning Rekursion REST API Reverse Proxy RFC RIP (Routing Information Protocol) RLHF RNN Rootkit Router Routing Routingtabelle S SaaS Salt Sandbox SATA Scrum SDK SFTP Shell SIP Site-to-Site-VPN SMTP SNMP Social Engineering Spoofing SQL SQL Injection SSD SSH SSID SSO Stack Standardgateway STP Subnetting Subnetzmaske Supernetting Supervised Learning Switch Syslog T TCP/IP Telnet TLS Token TOM Topologie TPU Traceroute Traffic Shaping Transaktion Treiber Trojaner TTL TTS Twisted-Pair-Kabel U UDP UML Unicast Uplink URI URL USV V V-Modell Vererbung Verschlüsselung Virtuelle Maschine Virtueller Server Virus VLAN VLAN-Tag VLSM VoIP VPN VXLAN W WAN Wasserfallmodell Webbrowser Webhook Wechseldatenträger Well-known Ports Wireshark WLAN WPA Wurm X X.25 X.509 XML XSS Y YAML Z Zero-Day Zero Trust ZigBee Zweierkomplement