Air GapA computer network that physically can't connect to other networks. | Audit TrailLogs and databases that record things that happen on your network. |
AuthenticationVerifying the identity of a person or digital entity. | AuthorizationThe process of granting access to a resource to an authenticated entity. |
CryptographyThe practice of coding data so that it can't be directly read. | Overlay NetworkA logical computer network built on top of another network. |
VPNA service that uses cryptography and a remote proxy to access a network. | Defense in DepthMultiple layers of security controls that do not assume anything about the other layers. |
HoneypotA fake network resource designed to detect or divert attacks. | Mutual AuthenticationA process whereby two entities such as a client and server authenticate each other. |
FirewallA security system that controls incoming and outgoing traffic to a network. | Network PerimeterA boundary built around a network using security infrastructure such as firewalls. |
Penetration TestTesting security by simulating attacks. | Proxy ServiceAn intermediary between a client and server. |
TarpitA network resource that is intentionally slow in order to slow an attack. | Intrusion DetectionA service that detects suspicious activities on a network. |
Intrusion PreventionA service that detects suspicious activity and actively blocks it. | Access ControlRestricting access to resources based on security policies. |
Incident ResponseThe process of managing information security incidents. | Endpoint SecuritySecuring endpoints on a network such as desktops and mobile devices. |
Vulnerability AssessmentThe process of identifying security vulnerabilities on a network. | Patch ManagementThe practice of updating network devices, services and endpoints. |
Threat intelligence and modelingThe process of monitoring and analyzing real-world cybersecurity threats. | Security CultureInvolving organizations in security with techniques such as security awareness training. |