Authentication |
The process of verifying the identity of a user or device trying to access a network or system, typically through the use of passwords or biometric data. |
Firewall |
A security device or software application that controls access to a network or system by filtering incoming and outgoing network traffic based on a set of predefined security rules. |
Encryption |
The process of converting plain text into ciphertext to protect sensitive information from unauthorized access or theft. |
Malware |
Malicious software designed to harm or exploit computer systems or networks, including viruses, worms, trojan horses, spyware, adware, and ransomware. |
Vulnerability |
A weakness or flaw in a computer system or network that can be exploited by an attacker to gain unauthorized access, steal sensitive information, or cause damage to the system or network. |
Intrusion |
An unauthorized attempt to access or disrupt a computer system or network, often carried out by hackers or cybercriminals using a variety of techniques such as social engineering or brute force attacks. |
Access Control |
The process of regulating who can access a network, system, or application, and what actions they can perform. Access control typically involves the use of policies, procedures, and security technologies such as authentication, authorization, and accounting (AAA). |
Penetration |
The process of testing a computer system or network for vulnerabilities and weaknesses by simulating the actions of an attacker. A penetration test is typically performed with the goal of identifying and addressing security weaknesses before they can be exploited by malicious actors. |
Patching |
The process of applying updates or fixes to software or hardware to address known security vulnerabilities or bugs. Patching is an essential aspect of maintaining network security, since vulnerabilities that are left unpatched can be exploited by attackers to gain unauthorized access to the system or network. |
Phishing |
A type of social engineering attack in which perpetrators trick individuals into revealing sensitive information, such as login credentials or payment card data, by posing as a trustworthy entity via email, phone, or other digital communication channels. |
Remote Access |
The ability to access a network or system from a location other than where it is physically located. Remote access is typically enabled through the use of virtual private networks (VPNs), remote desktop software, or other remote access tools. |
DMZ |
A demilitarized zone (DMZ) is a network segment that sits between an internal network, such as a corporate LAN, and an external network, typically the Internet. A DMZ is designed to provide an additional layer of security by isolating the internal network from external threats, such as hackers, malware, or other malicious actors. |
Two-factor |
The use of two separate methods of authentication to verify the identity of a person or device trying to access a network or system. Two-factor authentication typically involves the use of something the user knows, such as a password or PIN, and something the user has, such as a hardware or software token, a smart card, or a biometric factor such as a fingerprint or facial recognition. |
Denial of |
A type of cyberattack that involves flooding a network or system with a large volume of traffic or requests, effectively overwhelming it and causing it to become unavailable to legitimate users. DoS attacks can be carried out using a variety of techniques, such as ping floods, SYN floods, or UDP floods, and can be mitigated through the use of firewalls, intrusion prevention systems (IPS), or content distribution networks (CDNs). |
Distributed |
A type of cyberattack that involves coordinating the efforts of multiple attackers to overwhelm a network or system with a large volume of traffic or requests. DDoS attacks are typically carried out using a botnet, which is a network of infected devices under the control of an attacker. DDoS attacks can be mitigated through the use of firewalls, intrusion prevention systems (IPS), or content distribution networks (CDNs). |
Antivirus |
A type of software designed to detect, prevent, and remove malware from a computer system or network. Antivirus software typically uses a combination of signature-based detection, heuristics, and behavior-based analysis to identify and quarantine malicious code. |
Endpoint |
A device or application that is connected to a network and used to access network resources or services. Endpoint security involves the use of policies, procedures, and technologies to secure the various endpoints that are used to access a network, including desktops, laptops, smartphones, and IoT devices. |
Virtualization |
The process of creating a virtual version of a physical resource, such as a server, desktop, or network, using software. Virtualization enables multiple operating systems, applications, or services to run on a single physical device, making it easier to manage and scale network resources. |
Backup |
The process of copying and storing data to protect against accidental loss or corruption. Backups can be performed on a regular basis and stored on a separate device or in a cloud-based service to ensure that data can be restored in case of a disaster, such as a malware infection or hardware failure. |
Incident |
An unplanned event that disrupts the normal operation of a computer system or network, such as a security breach, malware infection, or hardware failure. Incident response is the process of detecting, analyzing, and responding to security incidents to minimize their impact and restore normal operations as quickly as possible. |