Security
Network security refers to the provisions, policies and infrastructure put in place by network administrators to monitor and prevent unauthorized access or use of a computer network and the data that passes through the network. Network security typically relies on multiple layers of protection as well as multiple components including networking monitoring and security software in addition to network security hardware and appliances.
From network security protocols like HTTPS and SSH to security software like virus scanners and anti-malware tools, our networking security dictionary offers a glossary of important terms you need to know.
Sub-Categories
- .dam
- .dr
- @m
- @mm
- AAA
- AC/DC virus
- access
- access code
- access control
- access control entry
- ACL - access control list
- active impostor acceptance
- active reconnaissance
- administrative domain
- adware
- AES
- air gap
- Android mobile security
- ANSI Bomb
- anti-adware
- anti-malware
- AntiExe
- antivirus program
- Appending Virus
- application gateway
- APT - advanced persistent threat
- Armored Virus
- ARP spoofing
- audit trail
- authentication
- authorization
- Auto ID
- AV Killer
- backdoor access (computing)
- Banker Trojan
- bastion host
- BEC - business email compromise
- Big Red Switch
- Bimodal virus
- binder
- biometric engine
- biometrics
- BlackHole Exploit Kit
- blended threat
- blind drop
- blockchain
- Blowfish
- bluebugging
- bluejacking
- bluesnarfing
- Booter services
- bootkit
- browser hijacker
- browser modifier
- buffer overflow
- BYOA – Bring Your Own Apps
- BYOC - Bring Your Own Cloud
- BYON – Bring Your Own Network
- capture
- card skimming
- cellphone virus
- CERT/CC
- Certificate bandit
- certification authority
- challenge-response
- CHAP
- CHMOD
- cipher text
- clickjack attack
- Clipper chip
- cloud-native app
- cluster virus
- CMIP
- Coinbit
- COLD - Computer Output to Laser Disk
- collateral hacking
- command-line scanner
- companion virus
- comparison
- computer virus (virus)
- Conficker
- consumerization of IT
- content package
- Content Vectoring Protocol
- CopyCat Malware
- countermeasure
- crack
- credential
- credit freeze
- Cridex malware
- crimeware
- cryptanalysis
- cryptocurrency
- cryptocurrency mining
- Cryptographic Service Provider
- cryptography
- CryptoLocker
- cryptomining malware
- CVE - Common Vulnerabilities and Exposures
- cyber crime
- cyber forensics
- Cyber Kill Chain
- cyber security boot camp
- cybersecurity
- DAC - Discretionary Access Control
- Darrloz (Linux.Darrloz)
- data at rest protection
- data integrity
- Data Sending Trojan
- data vaulting
- DDoS attack - Distributed Denial of Service
- decryption
- defacement
- Defense In-Depth
- DEP
- DES
- Destructive Trojan
- DHA
- dialer
- dictionary attack
- DigiNotar
- digital certificate
- digital envelope
- digital signature
- digital wallet
- DLP – data loss prevention
- DMZ - demilitarized zone
- DNSBL
- DNSChanger
- domain migration
- dongle
- Dorkbot
- DoS attack - Denial of Service attack
- Dragonchain
- Dridex malware
- drive-by download
- DRM
- dropper
- dual-homed host
- e-commerce trustmark
- e-discovery
- e-mail harvesting
- e-mail spoofing
- ECML - Electronic Commerce Modeling Language
- EDB - Execute Disable Bit
- EER - equal error rate
- EFS
- EFTPOS - Electronic Funds Transfer Point of Sale
- electronic discovery
- EMM - Enterprise Mobility Management
- encryption
- encryption algorithm
- enrollee
- enrollment
- ERD
- EV SSL
- evil twin
- exploit
- Extensible Threat Management - XTM
- extraction
- Face ID
- false acceptance
- FDE hard drive
- Federated Identity Manager
- file infecting virus
- financial malware
- firewalking
- firewall
- Flame (malware)
- Flooding
- FRR - false rejection rate
- FTP Trojan
- functional specification
- GameOver Zeus
- Gamimma (W32.Gammima.AG)
- gateway antivirus
- GHOST Bug
- Google Dorking
- Google Project Zero
- goto fail
- GRC - Governance, Risk, and Compliance
- greynet
- greyware
- GTbot
- hack
- hack tool
- hacker
- hacktivism
- Hand of Thief Trojan
- hashing
- HDCP - high-bandwidth digital-content protection
- Hexadite
- HIPS
- hole
- HoneyMonkey
- honeypot
- HWID - Hardware Identification
- hybrid encryption
- IAM – Identity and Access Management
- ICF
- IDaaS - Identity-as-a-Service
- identification
- identity
- identity management
- IHS
- IHU
- iJack
- ILM - identity lifecycle management
- IM worm
- image spam
- IMEI- International Mobile Equipment Identity
- impostor
- INS
- insider attack
- Internet Key Exchange
- intrusion detection system
- intrusion prevention system
- intrusion signature
- INU
- inverted network
- IP blocking
- IP spoofing
- iPhone mobile security
- IPsec VPN
- jammer
- Java Security Exploit
- Joe Job
- KeRanger
- Kerberos
- Kevin Mitnick
- key
- key escrow
- key fob
- key length
- keylogger (keystroke logging)
- kill switch
- Kill-Bit
- Kneber
- Koobface
- L0phtCrack
- layered defense
- leech
- lights out server room
- Linux/CDorked
- Linux/Ebury
- lock-in
- log on
- logic bomb
- MAC
- MACDefender
- machine binding
- macro virus
- malicious active content
- malicious code
- malvertising
- malvertising (malware)
- malware - malicious software
- man-in-the-middle attack
- Managed Security Service
- Mandatory Access Control
- Mariposa
- masquerade attack
- matching
- MCM - Mobile Content Management
- MD5
- memory-resident virus
- message digest
- Micro-Virtualization
- Micro-VM
- Microsoft Forefront Endpoint Security
- Microsoft Network Access Protection
- Microsoft Safety Scanner
- Microsoft Secure Boot
- Microsoft Security Development Lifecycle (SDL)
- Microsoft Security Essentials
- Microsoft Security Software
- microvisor
- mobile botnet
- mobile device security
- Mobile Information Management (MIM)
- mobile security
- mobile security apps
- mobile security best practices
- mobile security management
- mobile security threats
- Morto
- Mosquito
- multipartite virus
- NAC - Cisco Network Admission Control
- NAPT
- NAT - Network Address Translation
- Netbus
- Netcheque
- network identity
- network security
- next generation firewall - NGFW
- Nickispy
- NIPS
- NIT - Network Investigative Technique
- nonrepudiation
- NTLM - Windows NT LAN Manager
- Nuker
- obfuscated URL
- OMA DRM
- on-access scanner
- on-demand scanner
- OpenSSH
- Operation BugDrop
- Operation Windigo (malware)
- OPS
- OSVDB
- OVAL
- overwriting virus
- OWASP
- P3P
- packet filtering
- PAP - Password Authentication
- passive impostor acceptance
- passive reconnaissance
- password
- password cracking
- PAT - port address translation
- payload trigger
- PEAP
- perfect forward secrecy
- personally identifiable information
- Peskyspy
- pharming
- phishing (email)
- phreaking
- PII - Personally Identifiable Information
- ping of death
- PIX Firewall
- PKI
- plain text
- platform security
- pluggable authentication module
- polymorphic virus
- port forwarding
- port knocking
- port scanning
- Port to Application Mapping
- port triggering
- power user
- Pretty Good Privacy
- PRISM Program
- privacy statement
- Product Activation
- proof-of-concept code
- proof-of-concept virus
- provisioning
- Proxy Trojan
- public-key encryption
- pulsing zombie
- PUP - potentially unwanted program
- quarantine
- RADIUS server
- ransomware
- RAT
- Rav Mon E virus
- RBAC
- RBL - Realtime Blackhole List
- RC4/RC5/RC6
- RealServer
- RedBrowser
- reference template
- Remote Access Trojan
- remote attack
- reputation-based security
- retrovirus
- RHSBL
- rogue access point
- rogue antivirus software
- rogue certification authority certificate
- rogue peer
- rogue wireless device
- rootkit
- RSA
- RSA Secure ID
- RSIP
- S-HTTP
- S/key
- S/MIME
- SAML
- Samsung Galaxy S8
- sandbox
- SASL
- screen lock
- script kiddie
- Secure Electronic Transaction
- secure server
- security (computer security)
- security architecture
- security exploit
- security information management - SIM
- security policy
- security software disabler Trojan
- security vulnerability
- self-garbling virus
- SELinux
- session hijacking
- sheepdip
- Shellshock
- shoulder surfing
- Shylock malware
- SID - security identifier
- SideJacking
- sideloading
- SIEM - security information and event management
- single signon
- Skulls
- Skype worm
- Skywiper
- slimeware
- smart card
- smishing
- SMiShing - SMS phishing
- SmitFraud
- smurf attack
- snake oil
- sniffer
- Snort
- SoakSoak malware
- social engineering
- SOCKS
- sockstress
- SORBS
- spamware
- spear phishing
- split tunneling
- sploitz
- spoof
- spyware
- SQL injection
- SSH - Secure Shell
- SSH port forwarding
- SSL - Secure Sockets Layer
- SSL BEAST
- Stagefright
- stateful inspection
- stealth virus
- steganography
- strong password
- Stuxnet
- Superfish
- SURBL
- Symantec Corp.
- symmetric encryption
- symmetric-key cryptography
- TACACS
- targeted attack
- TCB - trusted computing base
- TCP SYN attack
- TCP Wrapper
- Teardrop attack
- Tempest
- threat actor
- timebomb
- TLS - Transport Layer Security
- token
- Tor
- Touch ID
- trackware
- Triple DES
- Trojan horse
- Trusted Platform Module - TPM
- Tunneling Virus
- turing number
- Twishing
- UAC - User Account Control
- Uberveillance
- Unified Threat Management
- Use After Free
- username
- VAPI
- variant
- VC
- Vein ID System
- VENOM vulnerability
- verification
- virtual honeypot
- virus disinfection
- virus protection
- virus scanner
- virus signature
- vishing
- vulnerability scanning
- WannaCry
- warchalking
- wardriving
- WebSEAL
- website spoofing
- Websphere
- WEP - Wired Equivalent Privacy
- Windows Defender
- Winwebsec
- WMM - Wi-Fi Multimedia
- worm
- WPA - Wi-Fi Protected Access
- WPA2 - Wi-Fi Protected Access 2
- 1
- 2
WEBOPEDIA NEWS
Stay up to date on the latest developments in Internet terminology with a free newsletter from Webopedia. Join to subscribe now.