Access Control |
It involves implementing mechanisms that restrict user or device entry to specific resources or areas within a network. |
Asymmetric Encryption |
A cryptographic system that uses two different keys: a public key for encryption and a private key for decryption. |
Authentication |
The act of confirming the identity of a user or device, with the purpose of granting access to a network or system. |
Authentication Factor |
A piece of information used to authenticate a user's identity, such as a password or biometric data. |
Biometric Authentication |
Unique physical or behavioral characteristics like fingerprints or iris scans are utilized to verify an individual's identity through the process of authentication. |
Certificate Authority |
An organization that issues digital certificates and verifies the authenticity of entities. |
Certificate Revocation |
The process of invalidating a digital certificate before its expiration date. |
Credentials |
Information used to authenticate a user's identity, typically consisting of a username and password. |
Decryption |
The process of converting ciphertext into plaintext using a decryption algorithm and a key. |
Digital Certificate |
An electronic document that confirms the credibility of a sender or receiver in a network communication. |
Digital Signature |
A cryptographic mechanism that ensures the authenticity and integrity of digital messages or documents. |
Encryption |
The process of converting plaintext into ciphertext using an encryption algorithm and a key. |
Firewall |
A network security device that employs predetermined security rules to filter and regulate incoming and outgoing network traffic. |
Hashing |
The process of converting a password into a fixed-length string of characters using a cryptographic algorithm. |
Intrusion Detection System |
A monitoring solution, whether it's in the form of software or hardware, which oversees network traffic to acknowledge and take action against potential security threats or attacks. |
Key Exchange |
The process of securely exchanging keys between parties in asymmetric encryption. |
Key Pair |
A pair of cryptographic keys, consisting of a public key and a private key. |
Network Security |
Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service. |
Network Validation |
The process of verifying that a network operates efficiently and satisfies the intended performance standards. |
Password Authentication |
The process of verifying the identity of a user by requiring them to provide a password. |
Phishing |
A fraudulent attempt to obtain sensitive information, such as passwords, by disguising as a trustworthy entity. |
Private Key |
In asymmetric encryption, a key that is kept secret and used for decryption. |
Public Key |
In asymmetric encryption, a key that is publicly available and used for encryption. |
Salt |
A random string of characters added to a password before hashing to protect against rainbow table attacks. |
Security Audit |
The process of assessing a network's security measures to identify weaknesses, evaluate potential threats, and suggest enhancements. |
Symmetric Encryption |
A cryptographic system that uses the same key for both encryption and decryption. |
Two-Factor Authentication |
A security process necessitating users to provide two distinct authentication factors, often a password and a unique code. |