Skip to content

Network Security Glossary

25 essential terms — because precise language is the foundation of clear thinking in Network Security.

Showing 25 of 25 terms

A set of rules on a network device that determines which traffic is allowed or denied based on source, destination, protocol, or port.

Related:FirewallNetwork Segmentation

A prolonged, targeted cyberattack in which an intruder gains access to a network and remains undetected for an extended period to steal data.

Related:Intrusion Detection SystemSIEM

The process of verifying the identity of a user, device, or system before granting access to network resources.

Related:Multi-Factor AuthenticationAuthorization

The process of determining what resources and operations an authenticated user or system is permitted to access.

Related:AuthenticationLeast Privilege

A network of compromised computers (bots) controlled remotely by an attacker, commonly used to launch DDoS attacks or distribute malware.

Related:DDoSMalware

A trusted entity that issues digital certificates to verify the identity of organizations, servers, and users in a Public Key Infrastructure.

Related:PKITLS/SSL

A method of examining the full data payload of network packets as they pass through an inspection point, enabling detection of malicious content beyond header information.

Related:FirewallIPS

A layered security strategy that deploys multiple defensive mechanisms so that if one layer is compromised, additional layers continue to protect the system.

Related:FirewallIDS/IPSEncryption

A physical or logical subnetwork that separates an internal local area network from untrusted external networks, typically hosting public-facing services.

Related:FirewallNetwork Segmentation

The process of converting readable data (plaintext) into an encoded format (ciphertext) that can only be decoded by authorized parties possessing the correct key.

Related:TLS/SSLPKICryptography

A network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

Related:ACLDeep Packet InspectionDMZ

A security mechanism set up as a decoy to attract attackers, detect unauthorized access attempts, and gather intelligence about attack techniques.

Related:Intrusion Detection SystemThreat Intelligence

A device or software application that monitors a network for malicious activity or policy violations and produces alerts.

Related:IPSSIEM

A network security tool that monitors traffic and actively blocks detected threats in addition to generating alerts.

Related:IDSFirewall

A security principle that restricts user and system access rights to only the minimum permissions necessary to perform their required tasks.

Related:AuthorizationZero Trust

Malicious software designed to damage, disrupt, or gain unauthorized access to a computer system. Includes viruses, worms, trojans, ransomware, and spyware.

Related:BotnetAntivirus

An authentication method that requires users to provide two or more verification factors from different categories to gain access.

Related:AuthenticationZero Trust

A technique that remaps IP addresses by modifying packet headers in transit, commonly used to allow multiple devices on a private network to share a single public IP address.

Related:FirewallRouter

The act of capturing data packets as they travel across a network for the purpose of analysis, troubleshooting, or unauthorized interception.

Related:Man-in-the-MiddleEncryption

An authorized simulated cyberattack against a computer system or network performed to evaluate and identify security vulnerabilities.

Related:Vulnerability ScanningEthical Hacking

Security Information and Event Management; a solution that collects, correlates, and analyzes log data from across an organization's infrastructure to detect security incidents.

Related:IDSLog Management

Transport Layer Security (and its predecessor Secure Sockets Layer) is a cryptographic protocol designed to provide secure communication over a computer network.

Related:EncryptionPKIHTTPS

Virtual Local Area Network; a logical subdivision of a physical network that groups devices into separate broadcast domains for improved security and traffic management.

Related:Network SegmentationSwitch

Virtual Private Network; a service that creates an encrypted connection over a less secure network, providing privacy and anonymity for the user's internet traffic.

Related:EncryptionTunnelingIPsec

A security framework requiring all users and devices to be authenticated, authorized, and continuously validated before being granted access to applications and data.

Related:Least PrivilegeMFAMicro-Segmentation
Network Security Glossary - Key Terms & Definitions | PiqCue