Network Validation | Authentication |
Network Security | Digital Certificate |
Biometric Authentication | Access Control |
Two-Factor Authentication | Intrusion Detection System |
The act of confirming the identity of a user or device, with the purpose of granting access to a network or system. | The process of verifying that a network operates efficiently and satisfies the intended performance standards. |
An electronic document that confirms the credibility of a sender or receiver in a network communication. | Implementing measures to safeguard a network against unauthorized access, improper use, alteration, or disruption of service. |
It involves implementing mechanisms that restrict user or device entry to specific resources or areas within a network. | Unique physical or behavioral characteristics like fingerprints or iris scans are utilized to verify an individual's identity through the process of authentication. |
A monitoring solution, whether it's in the form of software or hardware, which oversees network traffic to acknowledge and take action against potential security threats or attacks. | A security process necessitating users to provide two distinct authentication factors, often a password and a unique code. |
Firewall | Security Audit |
Password Authentication | Credentials |
Authentication Factor | Hashing |
Salt | Phishing |
The process of assessing a network's security measures to identify weaknesses, evaluate potential threats, and suggest enhancements. | A network security device that employs predetermined security rules to filter and regulate incoming and outgoing network traffic. |
Information used to authenticate a user's identity, typically consisting of a username and password. | The process of verifying the identity of a user by requiring them to provide a password. |
The process of converting a password into a fixed-length string of characters using a cryptographic algorithm. | A piece of information used to authenticate a user's identity, such as a password or biometric data. |
A fraudulent attempt to obtain sensitive information, such as passwords, by disguising as a trustworthy entity. | A random string of characters added to a password before hashing to protect against rainbow table attacks. |
Asymmetric Encryption | Symmetric Encryption |
Public Key | Private Key |
Key Exchange | Encryption |
Decryption | Certificate Authority |
A cryptographic system that uses the same key for both encryption and decryption. | A cryptographic system that uses two different keys: a public key for encryption and a private key for decryption. |
In asymmetric encryption, a key that is kept secret and used for decryption. | In asymmetric encryption, a key that is publicly available and used for encryption. |
The process of converting plaintext into ciphertext using an encryption algorithm and a key. | The process of securely exchanging keys between parties in asymmetric encryption. |
An organization that issues digital certificates and verifies the authenticity of entities. | The process of converting ciphertext into plaintext using a decryption algorithm and a key. |
Digital Signature | Certificate Revocation |
Key Pair | |
The process of invalidating a digital certificate before its expiration date. | A cryptographic mechanism that ensures the authenticity and integrity of digital messages or documents. |
A pair of cryptographic keys, consisting of a public key and a private key. | |