Internet Connections
Security Protocols
Network Reliability
Old Cartoon Villains
100

A high-speed digital bandwidth connection from a phone wall jack on an existing telephone network. With this, data and voice are both sent on the same copper wire with data using one frequency and voice using another.

Digital Subscriber Line (DSL)

100

A set of protocols that provides security for Internet Protocol (IP) that can be used to set up a VPN solution.

Internet Protocol Security (IPsec)

100

A term meaning that a network or a service is up and accessible most of the time.

High availability

100

This Teenage Mutant Ninja Turtles villain wears metal armor covered in blades.

The Shredder

200

 A digital mobile network that can provide internet access, commonly used by phones, tablets, laptops, and mobile hotspots.

Cellular networking

200

A protocol to secure IP protocols, such as HTTP and FTP, now largely unused.

Secure Sockets Layer (SSL)

200

A method for providing fault tolerance by using duplicate or multiple components that perform the same function.

Redundancy

200

This enemy of the transformers is very cruel to his minions and wants to conquer earth.

Megatron

300

 Internet access provided by companies that offer cable TV service using the same lines.

Cable

300

A protocol that evolved from SSL and provides privacy and data integrity between two communicating applications.

Transport Layer Security (TLS)

300

The percentage of time the network or service is up and accessible.

Uptime

300

This enemy of He-Man seeks to steal the power of Greyskull through trickery and evil magic.

Skeletor

400

Provides internet access by using signals transmitted to and received from orbiting satellites.

Satellite

400

A standard for system logging. Using this, any device can send messages about the status of events that are occurring on the device, operating system, or applications. Operates using UDP on ports 514 and 601.

System Logging Protocol (Syslog)

400

 The ability to respond to an unexpected hardware or software failure without loss of data or loss of operation.

Fault tolerance

400

This villain is the foe of Inspector Gadget and has a white cat and a menacing robotic claw hand.

Dr. Claw

500

A type of network that uses encryption to allow IP traffic to travel securely over the TCP/IP network. Used primarily to support secure communications over an untrusted network.

Virtual private network (VPN)

500

Communication method that encrypts packet contents and encapsulates them for routing though a public network.

Tunneling

500

Displays the graphical user interface of a remote device. Are used to remotely manage a computer or allow support personnel to view and troubleshoot a remote user's system.

Remote desktop

500

This villain is secretly the uncle of heiress Penelope Pitstop and wants to get rid of her to inherit her fortune.

The Hooded Claw

M
e
n
u