Your browser does not support JavaScript.
Cybersecurity Terms Lexicon
CTRL
K
Cybersecurity Terms Lexicon
Topics
Fundamentals
IAM
App Security
Network Security
Cloud Security
Security Ops
Incident Response
Threats
Theme
Auto
Dark
Light
Home
Categories
Network-Security
Network-Security
24
Posts
1
Sections
1
Types
Network Security
Network Firewall
Network-Security
A firewall is a security control that filters network traffic based on defined rules so unauthorized or unnecessary communication can be limited.
Read more about Network Firewall.
Network Security
Web Application Firewall
Network-Security
A web application firewall inspects HTTP and HTTPS requests to help detect or block suspicious web traffic before it reaches an application.
Read more about Web Application Firewall.
Network Security
Intrusion Detection System (IDS)
Network-Security
Monitors traffic or activity for suspicious patterns and generates alerts without necessarily blocking the activity.
Read more about Intrusion Detection System (IDS).
Network Security
Intrusion Prevention System (IPS)
Network-Security
Inspects traffic for suspicious patterns and can automatically block activity that matches prevention logic.
Read more about Intrusion Prevention System (IPS).
Network Security
Virtual Private Network (VPN)
Network-Security
Creates protected connectivity between devices or networks over a less trusted path such as the public internet.
Read more about Virtual Private Network (VPN).
Network Security
Zero Trust Network Access (ZTNA)
Network-Security
Provides narrower, identity-aware access to applications without assuming network location alone should grant trust.
Read more about Zero Trust Network Access (ZTNA).
Network Security
Network Segmentation Strategy
Network-Security
Network segmentation divides networks into smaller zones so traffic can be controlled more tightly and security incidents are easier to contain.
Read more about Network Segmentation Strategy.
Network Security
Network Microsegmentation
Network-Security
Microsegmentation applies very granular traffic controls between workloads or services so access is limited to specific allowed communications.
Read more about Network Microsegmentation.
Network Security
Demilitarized Zone
Network-Security
A demilitarized zone is a network area used to place externally reachable services away from more sensitive internal systems.
Read more about Demilitarized Zone.
Network Security
Bastion Host Access
Network-Security
A bastion host is a specially hardened system used as a controlled access point into sensitive environments.
Read more about Bastion Host Access.
Network Security
Deep Packet Inspection (DPI)
Network-Security
Deep packet inspection examines packet contents and metadata more closely than basic header-based traffic filtering.
Read more about Deep Packet Inspection (DPI).
Network Security
Network Access Control
Network-Security
Network access control decides whether a user or device can join a network and what level of access it receives based on identity, posture, or policy.
Read more about Network Access Control.
Network Security
Egress Filtering Controls
Network-Security
Egress filtering is the network-control practice of restricting which outbound connections internal systems or workloads are allowed to make.
Read more about Egress Filtering Controls.
Network Security
East-West Traffic Flows
Network-Security
East-west traffic is network communication between internal systems, services, or workloads rather than traffic crossing into or out of the environment.
Read more about East-West Traffic Flows.
Network Security
DNS Filtering for Domain Blocking
Network-Security
DNS filtering controls domain resolution so users and systems are blocked from reaching risky destinations.
Read more about DNS Filtering for Domain Blocking.
Network Security
Email Security Controls and Defenses
Network-Security
Controls that protect email systems, users, and workflows from fraud, malware, and data exposure.
Read more about Email Security Controls and Defenses.
Network Security
DNSSEC for DNS Integrity
Network-Security
DNSSEC adds authenticity and integrity checks to DNS data so resolvers can detect tampering or spoofing.
Read more about DNSSEC for DNS Integrity.
Network Security
Secure Shell (SSH)
Network-Security
SSH, or Secure Shell, is a protocol used to securely administer remote systems and move command-line traffic over an encrypted connection.
Read more about Secure Shell (SSH).
Network Security
Full Packet Capture (FPC)
Network-Security
Full packet capture is the recording of complete network packets so teams can inspect the contents and context of network communication in detail.
Read more about Full Packet Capture (FPC).
Network Security
Network Telemetry Data
Network-Security
Network telemetry is the operational data that describes network activity, health, communication patterns, and security-relevant traffic behavior.
Read more about Network Telemetry Data.
Network Security
Security Allowlist
Network-Security
An allowlist permits only explicitly approved users, devices, applications, addresses, or destinations and blocks everything else by default.
Read more about Security Allowlist.
Network Security
Security Denylist
Network-Security
A denylist blocks specified users, files, addresses, domains, or other items while leaving other activity permitted by default.
Read more about Security Denylist.
Network Security
Man-in-the-Middle Attacks (MITM)
Network-Security
Interception attack where an attacker sits between parties to observe, alter, or relay traffic.
Read more about Man-in-the-Middle Attacks (MITM).
Network Security
Email Authentication for Sender Trust
Network-Security
Controls that help mail systems verify whether a message came from an authorized sender.
Read more about Email Authentication for Sender Trust.