Air GapA computer network that physically can't connect to other networks.
Audit TrailLogs and databases that record things that happen on your network.
AuthenticationVerifying the identity of a person or digital entity.
AuthorizationThe process of granting access to a resource to an authenticated entity.
CryptographyThe practice of coding data so that it can't be directly read.
Overlay NetworkA logical computer network built on top of another network.
VPNA service that uses cryptography and a remote proxy to access a network.
Defense in DepthMultiple layers of security controls that do not assume anything about the other layers.
HoneypotA fake network resource designed to detect or divert attacks.
Mutual AuthenticationA process whereby two entities such as a client and server authenticate each other.
FirewallA security system that controls incoming and outgoing traffic to a network.
Network PerimeterA boundary built around a network using security infrastructure such as firewalls.
Penetration TestTesting security by simulating attacks.
Proxy ServiceAn intermediary between a client and server.
TarpitA network resource that is intentionally slow in order to slow an attack.
Intrusion DetectionA service that detects suspicious activities on a network.
Intrusion PreventionA service that detects suspicious activity and actively blocks it.
Access ControlRestricting access to resources based on security policies.
Incident ResponseThe process of managing information security incidents.
Endpoint SecuritySecuring endpoints on a network such as desktops and mobile devices.
Vulnerability AssessmentThe process of identifying security vulnerabilities on a network.
Patch ManagementThe practice of updating network devices, services and endpoints.
Threat intelligence and modelingThe process of monitoring and analyzing real-world cybersecurity threats.
Security CultureInvolving organizations in security with techniques such as security awareness training.