Glossary of Terms

Network validation & authentication

Keyword Definition
Access Control It involves implementing mechanisms that restrict user or device entry to specific resources or areas within a network.
Asymmetric Encryption A cryptographic system that uses two different keys: a public key for encryption and a private key for decryption.
Authentication The act of confirming the identity of a user or device, with the purpose of granting access to a network or system.
Authentication Factor A piece of information used to authenticate a user's identity, such as a password or biometric data.
Biometric Authentication Unique physical or behavioral characteristics like fingerprints or iris scans are utilized to verify an individual's identity through the process of authentication.
Certificate Authority An organization that issues digital certificates and verifies the authenticity of entities.
Certificate Revocation The process of invalidating a digital certificate before its expiration date.
Credentials Information used to authenticate a user's identity, typically consisting of a username and password.
Decryption The process of converting ciphertext into plaintext using a decryption algorithm and a key.
Digital Certificate An electronic document that confirms the credibility of a sender or receiver in a network communication.
Digital Signature A cryptographic mechanism that ensures the authenticity and integrity of digital messages or documents.
Encryption The process of converting plaintext into ciphertext using an encryption algorithm and a key.
Firewall A network security device that employs predetermined security rules to filter and regulate incoming and outgoing network traffic.
Hashing The process of converting a password into a fixed-length string of characters using a cryptographic algorithm.
Intrusion Detection System A monitoring solution, whether it's in the form of software or hardware, which oversees network traffic to acknowledge and take action against potential security threats or attacks.
Key Exchange The process of securely exchanging keys between parties in asymmetric encryption.
Key Pair A pair of cryptographic keys, consisting of a public key and a private key.
Network Security Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service.
Network Validation The process of verifying that a network operates efficiently and satisfies the intended performance standards.
Password Authentication The process of verifying the identity of a user by requiring them to provide a password.
Phishing A fraudulent attempt to obtain sensitive information, such as passwords, by disguising as a trustworthy entity.
Private Key In asymmetric encryption, a key that is kept secret and used for decryption.
Public Key In asymmetric encryption, a key that is publicly available and used for encryption.
Salt A random string of characters added to a password before hashing to protect against rainbow table attacks.
Security Audit The process of assessing a network's security measures to identify weaknesses, evaluate potential threats, and suggest enhancements.
Symmetric Encryption A cryptographic system that uses the same key for both encryption and decryption.
Two-Factor Authentication A security process necessitating users to provide two distinct authentication factors, often a password and a unique code.