Network Validation | Authentication |
Network Security | Digital Certificate |
Biometric Authentication | Access Control |
Two-Factor Authentication | Intrusion Detection System |
The act of confirming the identity of a user or device, with the purpose of granting access to a network or system. | The process of verifying that a network operates efficiently and satisfies the intended performance standards. |
An electronic document that confirms the credibility of a sender or receiver in a network communication. | Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service. |
It involves implementing mechanisms that restrict user or device entry to specific resources or areas within a network. | Unique physical or behavioral characteristics like fingerprints or iris scans are utilized to verify an individual's identity through the process of authentication. |
A monitoring solution, whether it's in the form of software or hardware, which oversees network traffic to acknowledge and take action against potential security threats or attacks. | A security process necessitating users to provide two distinct authentication factors, often a password and a unique code. |
Firewall | Security Audit |
Password Authentication | Credentials |
Authentication Factor | Hashing |
Salt | Phishing |
The process of assessing a network's security measures to identify weaknesses, evaluate potential threats, and suggest enhancements. | A network security device that employs predetermined security rules to filter and regulate incoming and outgoing network traffic. |
Information used to authenticate a user's identity, typically consisting of a username and password. | The process of verifying the identity of a user by requiring them to provide a password. |
The process of converting a password into a fixed-length string of characters using a cryptographic algorithm. | A piece of information used to authenticate a user's identity, such as a password or biometric data. |
A fraudulent attempt to obtain sensitive information, such as passwords, by disguising as a trustworthy entity. | A random string of characters added to a password before hashing to protect against rainbow table attacks. |
Asymmetric Encryption | Symmetric Encryption |
Public Key | Private Key |
Key Exchange | Encryption |
Decryption | Certificate Authority |
A cryptographic system that uses the same key for both encryption and decryption. | A cryptographic system that uses two different keys: a public key for encryption and a private key for decryption. |
In asymmetric encryption, a key that is kept secret and used for decryption. | In asymmetric encryption, a key that is publicly available and used for encryption. |
The process of converting plaintext into ciphertext using an encryption algorithm and a key. | The process of securely exchanging keys between parties in asymmetric encryption. |
An organization that issues digital certificates and verifies the authenticity of entities. | The process of converting ciphertext into plaintext using a decryption algorithm and a key. |
Digital Signature | Certificate Revocation |
Key Pair | Antivirus |
Virtual Private Network | Intrusion Prevention System |
Vulnerability Scanning | Security Policy |
The process of invalidating a digital certificate before its expiration date. | A cryptographic mechanism that ensures the authenticity and integrity of digital messages or documents. |
Software designed to detect and remove computer viruses, preventing them from spreading and causing harm to a computer network. | A pair of cryptographic keys, consisting of a public key and a private key. |
A network security device that monitors and blocks malicious activities and prevents potential network attacks. | A secure network connection that allows remote users to access a private network over the internet securely. |
A documented set of rules and procedures that define the organization's approach to network security and guide security implementations. | The process of identifying and assessing security vulnerabilities in a network infrastructure to address and mitigate potential risks. |
Antivirus Software | Network Segmentation |
Network Security Audit | Penetration Testing |
Acceptable Use Policy | User Agreement |
Internet Usage Policy | Incident Response Plan |
The process of dividing a computer network into smaller subnetworks for improved security and performance. | Software designed to detect and remove malicious software, such as viruses, from computer systems. |
A controlled attempt to exploit vulnerabilities in a network to assess its level of security. | A process of assessing the security measures implemented in a network to identify vulnerabilities and potential risks. |
A legally binding contract between a user and a service provider that establishes the terms and conditions for using the service. | A set of rules and guidelines that outline the proper and acceptable use of a system, network, or service. |
A documented set of procedures and guidelines that an organization follows when responding to and managing security incidents. | A policy that governs the appropriate use of the internet and outlines the rules for accessing and using online resources. |
Mitigation | Internet Protocol Security |
Authentication Header | Encapsulating Security Payload |
Key Management Protocol | Transport Mode |
Tunnel Mode | Security Association |
A protocol suite used for securing communications by authenticating and encrypting each IP packet of a communication session. | The process of reducing or eliminating the impact of a security incident or vulnerability by implementing preventive measures. |
A protocol in IPsec that provides confidentiality, data integrity, and authentication of the packets. | A protocol used in IPsec to provide data integrity, authentication, and anti-replay services. |
An IPsec configuration where only the payload of the IP packet is encrypted and authenticated, while the original IP header remains intact. | A protocol used to establish security associations in IPsec, allowing the negotiation of keys and algorithms for secure communication. |
A set of security parameters negotiated between two IPsec peers for secure communication, including encryption algorithm, integrity algorithm, and keys. | An IPsec configuration where the entire IP packet is encapsulated within another IP packet for secure communication between networks. |
Access Control List | Wired Equivalent Privacy |
Wi-Fi Protected Access | Wpa2 |
Wpa3 | |
A security protocol for wireless networks that provides data confidentiality and access control mechanisms. | A set of rules that control network traffic by allowing or denying packets based on specified criteria such as source or destination IP address, port number, or protocol. |
A more secure version of WPA that uses stronger encryption algorithms. | A security protocol for wireless networks that improves upon the security features of WEP. |
The latest standard for wireless network security, providing enhanced protection against various attacks. | |