Network Validation Authentication
Network Security Digital Certificate
Biometric Authentication Access Control
Two-Factor Authentication Intrusion Detection System

 

The act of confirming the identity of a user or device, with the purpose of granting access to a network or system. The process of verifying that a network operates efficiently and satisfies the intended performance standards.
An electronic document that confirms the credibility of a sender or receiver in a network communication. Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service.
It involves implementing mechanisms that restrict user or device entry to specific resources or areas within a network. Unique physical or behavioral characteristics like fingerprints or iris scans are utilized to verify an individual's identity through the process of authentication.
A monitoring solution, whether it's in the form of software or hardware, which oversees network traffic to acknowledge and take action against potential security threats or attacks. A security process necessitating users to provide two distinct authentication factors, often a password and a unique code.

 

Firewall Security Audit
Password Authentication Credentials
Authentication Factor Hashing
Salt Phishing

 

The process of assessing a network's security measures to identify weaknesses, evaluate potential threats, and suggest enhancements. A network security device that employs predetermined security rules to filter and regulate incoming and outgoing network traffic.
Information used to authenticate a user's identity, typically consisting of a username and password. The process of verifying the identity of a user by requiring them to provide a password.
The process of converting a password into a fixed-length string of characters using a cryptographic algorithm. A piece of information used to authenticate a user's identity, such as a password or biometric data.
A fraudulent attempt to obtain sensitive information, such as passwords, by disguising as a trustworthy entity. A random string of characters added to a password before hashing to protect against rainbow table attacks.

 

Asymmetric Encryption Symmetric Encryption
Public Key Private Key
Key Exchange Encryption
Decryption Certificate Authority

 

A cryptographic system that uses the same key for both encryption and decryption. A cryptographic system that uses two different keys: a public key for encryption and a private key for decryption.
In asymmetric encryption, a key that is kept secret and used for decryption. In asymmetric encryption, a key that is publicly available and used for encryption.
The process of converting plaintext into ciphertext using an encryption algorithm and a key. The process of securely exchanging keys between parties in asymmetric encryption.
An organization that issues digital certificates and verifies the authenticity of entities. The process of converting ciphertext into plaintext using a decryption algorithm and a key.

 

Digital Signature Certificate Revocation
Key Pair Antivirus
Virtual Private Network Intrusion Prevention System
Vulnerability Scanning Security Policy

 

The process of invalidating a digital certificate before its expiration date. A cryptographic mechanism that ensures the authenticity and integrity of digital messages or documents.
Software designed to detect and remove computer viruses, preventing them from spreading and causing harm to a computer network. A pair of cryptographic keys, consisting of a public key and a private key.
A network security device that monitors and blocks malicious activities and prevents potential network attacks. A secure network connection that allows remote users to access a private network over the internet securely.
A documented set of rules and procedures that define the organization's approach to network security and guide security implementations. The process of identifying and assessing security vulnerabilities in a network infrastructure to address and mitigate potential risks.

 

Antivirus Software Network Segmentation
Network Security Audit Penetration Testing
Acceptable Use Policy User Agreement
Internet Usage Policy Incident Response Plan

 

The process of dividing a computer network into smaller subnetworks for improved security and performance. Software designed to detect and remove malicious software, such as viruses, from computer systems.
A controlled attempt to exploit vulnerabilities in a network to assess its level of security. A process of assessing the security measures implemented in a network to identify vulnerabilities and potential risks.
A legally binding contract between a user and a service provider that establishes the terms and conditions for using the service. A set of rules and guidelines that outline the proper and acceptable use of a system, network, or service.
A documented set of procedures and guidelines that an organization follows when responding to and managing security incidents. A policy that governs the appropriate use of the internet and outlines the rules for accessing and using online resources.

 

Mitigation Internet Protocol Security
Authentication Header Encapsulating Security Payload
Key Management Protocol Transport Mode
Tunnel Mode Security Association

 

A protocol suite used for securing communications by authenticating and encrypting each IP packet of a communication session. The process of reducing or eliminating the impact of a security incident or vulnerability by implementing preventive measures.
A protocol in IPsec that provides confidentiality, data integrity, and authentication of the packets. A protocol used in IPsec to provide data integrity, authentication, and anti-replay services.
An IPsec configuration where only the payload of the IP packet is encrypted and authenticated, while the original IP header remains intact. A protocol used to establish security associations in IPsec, allowing the negotiation of keys and algorithms for secure communication.
A set of security parameters negotiated between two IPsec peers for secure communication, including encryption algorithm, integrity algorithm, and keys. An IPsec configuration where the entire IP packet is encapsulated within another IP packet for secure communication between networks.

 

Access Control List Wired Equivalent Privacy
Wi-Fi Protected Access Wpa2
Wpa3

 

A security protocol for wireless networks that provides data confidentiality and access control mechanisms. A set of rules that control network traffic by allowing or denying packets based on specified criteria such as source or destination IP address, port number, or protocol.
A more secure version of WPA that uses stronger encryption algorithms. A security protocol for wireless networks that improves upon the security features of WEP.
The latest standard for wireless network security, providing enhanced protection against various attacks.