Individual accountability

Individual accountability: The practice of holding individuals accountable for their actions, including any security breaches or violations. This can help to ensure that employees take responsibility for their actions and can help to prevent security incidents by creating a culture of accountability within the organization. An example of individual accountability might be requiring employees to […]

IEEE 802.15.4

IEEE 802.15.4: IEEE 802.15.4 is a technical standard governing low-rate wireless personal area networks (LR-WPANs). It specifies the physical layer and media access control for LR-WPANs, focusing on simple, low-cost communication with low power consumption. The standard underpins technologies such as Zigbee and Thread, facilitating their application in IoT devices like smart home systems and […]

IEEE 802.1x

IEEE 802.1x: A port-based network access control protocol that provides an authentication mechanism to devices wishing to attach to a network. It is utilized in environments where a higher level of security is required, including preventing unauthorized access to network services and resources. The protocol works by enforcing a client-server model, where a client is […]

IEEE 802.3

IEEE 802.3: Commonly known as Ethernet, IEEE 802.3 is a family of standards defining the physical layer and data link layer’s media access control (MAC) of wired networks. The standard forms the basis for the most widely deployed local area network (LAN) technology, Ethernet, allowing for devices to communicate within the same network and supporting […]

Immutable Infrastructure

Immutable Infrastructure: The concept of replacing existing infrastructure components or systems instead of updating them. With an immutable infrastructure, once a system or component is deployed, it is not modified – any changes lead to a new deployment of a system or component. This philosophy is intended to increase the reliability, consistency, and repeatability of […]

Impairment

Impairment: Any issue or condition that disrupts the optimal functioning of a system, application, or network. Causes can range from hardware failures and software bugs to malicious attacks and network congestion. Security protocols aim to identify and resolve impairments to maintain system reliability and availability.