Browse Definitions :

Network security

Terms related to network security, including definitions about intrusion prevention and words and phrases about VPNs and firewalls.

TCP - ZRT

  • TCP Wrapper - TCP Wrapper is a public domain computer program that provides firewall services for UNIX servers.
  • tcpdump - Tcpdump is an open source command-line tool for monitoring (sniffing) network traffic.
  • TDL-4 (TDSS or Alureon) - TDL-4 is sophisticated malware that facilitates the creation and maintenance of a botnet.
  • Tempest - Tempest was the name of a classified (secret) U.
  • thingbot - A thingbot is something with an embedded system and an Internet connection that has been coopted by a hacker as a part of a botnet.
  • threat actor - A threat actor, also called a malicious actor, is an entity that is partially or wholly responsible for an incident that impacts – or has the potential to impact -- an organization's security.
  • threat intelligence (cyber threat intelligence) - Threat intelligence, also known as cyber threat intelligence (CTI), is organized, analyzed and refined information about current or potential attacks that could negatively affect an organization.
  • threat intelligence feed (TI feed) - A threat intelligence feed is an ongoing stream of data related to potential or current threats to an organization’s security.
  • threat intelligence service (TI service) - A threat intelligence service (TI service) is a provider of information about current or emerging threats that could negatively impact the security of a customer’s organization.
  • threat modeling - Threat modeling is a procedure for optimizing network security by identifying objectives and vulnerabilities, and then defining countermeasures to prevent, or mitigate the effects of, threats to the system.
  • throttled data transfer - Throttled data transfer, also known as data transfer throttling or lean data transfer, is the deliberate regulation of the data transfer rate in a communications system.
  • tiger team - In the computer industry, a tiger team is a group of programmers or users who volunteer or are hired to expose errors or security holes in new software or to find out why a computer network's security is being broken.
  • Tilded platform - The Tilded platform is a malicious software communicator specifically designed as a vessel for transmitting malware undetected.
  • token - In general, a token is an object that represents something else, such as another object (either physical or virtual), or an abstract concept as, for example, a gift is sometimes referred to as a token of the giver's esteem for the recipient.
  • tokenization - Tokenization is the process of replacing sensitive data with unique identification symbols that retain all the essential information about the data without compromising its security.
  • topsite - A topsite is a stringently protected underground FTP server at the top of the distribution chain for pirated content, such as movies, music, games, and software.
  • Total Information Awareness (TIA) - Total Information Awareness (TIA) is the name of a massive U.
  • Transport Layer Security (TLS) - Transport Layer Security (TLS) is a protocol that provides authentication, privacy, and data integrity between two communicating computer applications.
  • trigraph - A trigraph is a three-character replacement for a special or nonstandard character in a text file.
  • Trojan horse (computing) - In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, malicious.
  • trusted computing base (TCB) - The trusted computing base (TCB) is everything in a computing system that provides a secure environment.
  • Trusted Computing Group (TCG) - The Trusted Computing Group (TCG) is a not-for-profit organization that was formed in 2003 to define, develop and promote security specifications for computers and networks.
  • Turtle Firewall - Turtle Firewall is an open source firewall program written in Perl that supports Linux Kernels 2.
  • two-factor authentication (2FA) - Two-factor authentication (2FA), sometimes referred to as two-step verification or dual factor authentication, is a security process in which the user provides two different authentication factors to verify themselves to better protect both the user's credentials and the resources the user can access.
  • Twofish - Twofish is an encryption algorithm based on an earlier algorithm, Blowfish, and was a finalist for a NIST Advanced Encryption Standard (AES) algorithm to replace the DES algorithm.
  • unauthenticated security scan (logged-out secuity scan) - An unauthenticated security scan, sometimes called a logged-out scan, is the process of exploring a network or networked system for vulnerabilities that are accessible without logging in as an authorized user.
  • unique default password - Unique default passwords can provide more security, although that depends on what type of system is used.
  • universal authentication - Universal authentication is a network identity-verification method that allows users to move from site to site securely without having to enter identifying information multiple times.
  • Uptime Institute, Inc. - The Uptime Institute, Inc.
  • URL manipulation (URL rewriting) - URL manipulation, also called URL rewriting, is the process of altering (often automatically by means of a program written for that purpose) the parameters in a URL (Uniform Resource Locator).
  • URL poisoning (location poisoning) - URL poisoning, also known as location poisoning, is a method of tracking Web user behavior by adding an identification (ID) number to the page address (Uniform Resource Locator) line of the Web browser when a user visits a particular site.
  • user account provisioning - User account provisioning is a business process for creating and managing access to resources in an information technology (IT) system.
  • user profile - In a Windows environment, a user profile is a record of user-specific data that define the user's working environment.
  • van Eck phreaking - Van Eck phreaking is a form of electronic eavesdropping that reverse engineers the electromagnetic fields (EM fields) produced by a computing device.
  • virtual honeypot - A virtual honeypot is software that emulates a vulnerable system or network to attract intruders and study their behavior.
  • virtual machine escape - Virtual machine escape is an exploit in which the attacker runs code on a VM that allows an operating system running within it to break out and interact directly with the hypervisor.
  • virtual private cloud (VPC) - A virtual private cloud (VPC) is the logical division of a service provider's public cloud multi-tenant architecture to support private cloud computing.
  • virus hoax - A virus hoax is a false warning about a computer virus.
  • virus signature (virus definition) - A virus signature (also known as a virus definition) is a file or multiple files that are downloaded by a security program to identify a computer virus.
  • VLAN hopping (virtual local area network hopping) - VLAN hopping (virtual local area network hopping) is a method of attacking a network by sending packets to a port at a network end point that is not normally accessible to the sender.
  • voice logger - A voice logger is a device or program used to record audio information from telephones, radios, microphones and other sources for storage on a computer's hard drive or removable media.
  • voice squatting (skill squatting) - Voice squatting is an attack vector for voice user interfaces (VUIs) that exploits homonyms (words that sound the same but are spelled differently) and input errors (words that are mispronounced).
  • voiceprint - A voiceprint is a set of measurable characteristics of a human voice that uniquely identifies an individual.
  • VOIPSA (Voice over IP Security Alliance) - VOIPSA (Voice over IP Security Alliance) is a cross-industry coalition of individuals and organizations from the security and VoIP communications sectors.
  • vomit - Vomit (spelled all lower-case) is a Unix software utility that takes IP telephony packets captured by another Unix tool, tcpdump, and reassembles them into a Wave file that can be listened to over a computer's speakers.
  • Vouch by Reference (VBR) - Vouch By Reference (VBR) is a protocol for adding third-party certification to email.
  • VPN appliance - A VPN (virtual private network) appliance is a network device equipped with enhanced security features.
  • VPN Reconnect - VPN Reconnect is a feature of Windows 7 and Windows Server 2008 R2 that allows a virtual private network (VPN) connection to remain open during a brief interruption of Internet service.
  • vulnerability and patch management - Vulnerability management is a pro-active approach to managing network security.
  • vulnerability disclosure - Vulnerability disclosure is the practice of publishing information about a computer security problem, and a type of policy that stipulates guidelines for doing so.
  • vulnerability management planning - Vulnerability management planning is a comprehensive approach to the development of a continuous and repetitive system of practices and processes designed to identify, analyze and address flaws in hardware or software that could serve as attack vectors.
  • war dialer - A war dialer is a computer program used to identify the phone numbers that can successfully make a connection with a computer modem.
  • war driving (access point mapping) - War driving, also called access point mapping, is the act of locating and possibly exploiting connections to wireless local area networks while driving around a city or elsewhere.
  • web server security - Web server security is the protection of information assets that can be accessed from a Web server.
  • Web Services Trust Language (WS-Trust) - Web Services Trust Language (WS-Trust) is a specification that uses the secure messaging mechanisms of WS-Security to facilitate trust relationships in diverse Web service environments.
  • white hat - A white hat hacker is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks.
  • Wi-Fi (802.11x standard) - Wi-Fi is the popular term for high-frequency wireless local area network (WLAN) technology and a standard that has gained acceptance in many companies as an alternative to a wired LAN.
  • Wi-Fi Protected Access (WPA) - Wi-Fi Protected Access (WPA) is a security standard for users of computing devices equipped with wireless internet connections, or Wi-Fi.
  • wide-area file services (WAFS) - Wide-area file services (WAFS) is a storage technology that makes it possible to access a remote data center as though it were local.
  • Wiegand - Wiegand is the trade name for a technology used in card readers and sensors, particularly for access control applications.
  • wildcard certificate - A wildcard certificate is a digital certificate that is applied to a domain and all its subdomains.
  • Wingate - Wingate is a product that allows people on a small home network or a larger business network to share and control access to the Internet through a single computer connection.
  • WIPS (wireless intrusion prevention system) - A wireless intrusion prevention system (WIPS) is a dedicated security device or integrated software application that monitors a wireless LAN network's radio spectrum for rogue access points and other wireless threats.
  • Wired Equivalent Privacy (WEP) - Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.
  • Wireless Transport Layer Security (WTLS) - Wireless Transport Layer Security (WTLS) is the security level for Wireless Application Protocol (WAP) applications.
  • wiretap Trojan - A wiretap Trojan is a program that surreptitiously records VoIP calls.
  • wiretapping - Wiretapping is the surreptitious electronic monitoring of telephone, telegraph, cellular, fax or Internet-based communications.
  • WPA3 - WPA3, also known as Wi-Fi Protected Access 3, is the third version of the security certification program developed by the Wi-Fi Alliance that works to secure wireless networks and ensure Wi-Fi related products meet a common standard.
  • XPath injection - XPath injection is an attack targeting Web sites that create XPath queries from user-supplied data.
  • Z-Wave - Z-Wave is a wireless communication protocol used primarily in smart home networks, allowing smart devices to connect and exchange control commands and data with each other.
  • zero-day exploit - A zero-day exploit is one that takes advantage of a security vulnerability on the same day that the vulnerability becomes generally known.
  • zero-trust model (zero trust network) - The zero trust model is a security model used by IT professionals that requires strict identity and device verification regardless of the user’s location in relation to the network perimeter.
  • zombie computer (zombie bot) - A zombie (also known as a bot) is a computer that a remote attacker has accessed and set up to forward transmissions (including spam and viruses) to other computers on the Internet.
  • zoo - A zoo is a collection of viruses and worms that exist only in virus and anti-virus labs.
  • ZRTP (Zimmermann Real-Time Transport Protocol) - ZRTP is an extension of the Real-Time Transport Protocol (RTP) that describes a method of generating cryptographic keys for enhanced communications security and privacy.

-ADS BY GOOGLE

SearchCompliance

SearchSecurity

  • computer worm

    A computer worm is a type of malicious software program whose primary function is to infect other computers while remaining ...

  • Single Sign-On (SSO)

    Single sign-on (SSO) is a session and user authentication service that permits a user to use one set of login credentials (e.g., ...

  • Certified Information Systems Auditor (CISA)

    Certified Information Systems Auditor (CISA) is a certification issued by ISACA to people in charge of ensuring that an ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity plan (BCP)

    A business continuity plan (BCP) is a document that consists of the critical information an organization needs to continue ...

  • disaster recovery team

    A disaster recovery team is a group of individuals focused on planning, implementing, maintaining, auditing and testing an ...

  • cloud insurance

    Cloud insurance is any type of financial or data protection obtained by a cloud service provider. 

SearchStorage

Close