System and Network Security Glossary
13 essential terms — because precise language is the foundation of clear thinking in System and Network Security.
Showing 13 of 13 terms
An attack technique where an adversary sends falsified ARP messages on a local network to associate their MAC address with another host's IP address, enabling traffic interception.
A perimeter network segment that hosts public-facing services while isolating them from the internal network, typically protected by firewalls on both sides.
A network security device or software that monitors and filters network traffic based on security rules, acting as a barrier between trusted and untrusted networks.
A property of key exchange protocols ensuring that compromise of a long-term key does not compromise past session keys, because each session uses unique ephemeral keys.
A security system that monitors network traffic or system activities for suspicious behavior and generates alerts without taking active blocking action.
A security system deployed inline that monitors traffic and actively blocks or prevents detected threats in real time.
A suite of protocols operating at Layer 3 that provides encryption (ESP), authentication (AH), and key management (IKE) for securing IP communications.
A security framework that evaluates a device's security posture and enforces compliance policies before granting network access.
An access control model that assigns permissions to organizational roles rather than individual users, simplifying permission management in large organizations.
A platform that aggregates and correlates log data from multiple IT sources to detect security threats, generate alerts, and support incident investigation.
A cryptographic protocol that provides secure communication over a network through encryption, authentication via digital certificates, and data integrity.
A technology that creates an encrypted tunnel over a public network, providing secure communication between endpoints through encryption, authentication, and integrity protection.
A security model based on 'never trust, always verify,' requiring continuous authentication and authorization for every access request regardless of network location.