Firewall | Antivirus |
Intrusion Detection System | Encryption |
Virtual Private Network | Two-Factor Authentication |
Access Control | Intrusion Prevention System |
Software designed to detect and remove computer viruses, preventing them from spreading and causing harm to a computer network. | A network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. |
The process of converting plaintext data into an unreadable form to protect it from unauthorized access or theft. | A system that monitors network traffic to identify and respond to unauthorized access attempts or malicious activities. |
A security measure that requires users to provide two separate forms of identification, typically a password and a unique code, to access a network or system. | A secure network connection that allows remote users to access a private network over the internet securely. |
A network security device that monitors and blocks malicious activities and prevents potential network attacks. | The practice of restricting and managing user access to network resources based on predetermined security policies. |
Vulnerability Scanning | Security Policy |
Antivirus Software | Network Segmentation |
Network Security Audit | Penetration Testing |
Acceptable Use Policy | User Agreement |
A documented set of rules and procedures that define the organization's approach to network security and guide security implementations. | The process of identifying and assessing security vulnerabilities in a network infrastructure to address and mitigate potential risks. |
The process of dividing a computer network into smaller subnetworks for improved security and performance. | Software designed to detect and remove malicious software, such as viruses, from computer systems. |
A controlled attempt to exploit vulnerabilities in a network to assess its level of security. | A process of assessing the security measures implemented in a network to identify vulnerabilities and potential risks. |
A legally binding contract between a user and a service provider that establishes the terms and conditions for using the service. | A set of rules and guidelines that outline the proper and acceptable use of a system, network, or service. |
Internet Usage Policy | Incident Response Plan |
Mitigation | |
A documented set of procedures and guidelines that an organization follows when responding to and managing security incidents. | A policy that governs the appropriate use of the internet and outlines the rules for accessing and using online resources. |
The process of reducing or eliminating the impact of a security incident or vulnerability by implementing preventive measures. | |