- Negative-list A negative-list, also known as a denylist or blacklist, is an access control mechanism that specifies entities, such as user accounts, email addresses, or IP addresses, which are explicitly denied access or privileges within a system or network. This approach contributes to safeguarding against unauthorized access and securing systems from potential attackers or harmful activities.
- Netflix Chaos Monkey A tool used by the streaming company Netflix to test the resilience of its systems by randomly shutting down individual services and components. This helps to ensure that the system can continue to operate even in the face of failures and disruptions.
- Network A group of interconnected devices that can communicate and exchange data with each other. Used in computer systems, telecommunications, and other industries to facilitate communication and sharing of resources. Examples include local area networks (LANs), wide area networks (WANs), and virtual private networks (VPNs).
- Network Access Control (NAC) A method of bolstering the security of a proprietary network by restricting the availability of network resources to endpoint devices that comply with a defined security policy. This includes laptops, smartphones, tablets, and other devices. It functions by carrying out a series of checks on each device as it connects to the network, determining its security posture and compliance status before granting it the appropriate level of access.
- Network Address Translation (NAT) A methodology that helps mitigate IP address limitations by allowing multiple devices on a private network to share a single public IP address. It plays a key role in network security as it serves as a natural firewall by keeping private IP addresses hidden from external networks, thus preventing unauthorized access from external entities.
- Network administrator A professional responsible for the operational readiness of an organization's data communications systems, which includes maintaining, upgrading, and defending networks from potential threats. They play a critical role in ensuring that network infrastructure is efficient and secure, monitoring system performance, configuring and implementing network software and hardware, and troubleshooting network issues, among other duties.
- Network Attached Storage (NAS) A type of dedicated file storage technology that provides local area network nodes with file-based shared storage through a standard Ethernet connection. It allows more hard disk storage space to be added to a network that already exists. Because the stored data is not located on any of the network's client devices but, instead, on the NAS system, it can be accessed and shared in a flexible and efficient way.
- Network-attached storage (NAS) A dedicated device that provides shared storage services to devices connected to a network. It allows multiple users and diverse client devices to retrieve data from a centralized disk capacity. Users on a local area network (LAN) access the NAS via a standard Ethernet connection. NAS is useful for backing up, sharing files, and setting up centralized multimedia storage, and can enhance data security by enabling regular and automated data backups.
- Network attacks Malicious activities employed by individuals or entities intending to compromise the integrity, confidentiality, or availability of a network and its data. These attacks can take numerous forms, such as Distributed Denial of Service (DDoS) attacks, Man-in-the-Middle (MitM) attacks, or password-based attacks, each with the intent to exploit vulnerabilities in a network's infrastructure.
- Network-Based IDS (NIDS)/Network-Based IPS (NIPS) Network-Based Intrusion Detection Systems (NIDS) are security solutions that monitor network traffic to detect suspicious activity and potential security breaches. Upon detection, NIDS generates alerts for further investigation. Network-based intrusion Prevention Systems (NIPS) go a step further by actively blocking or mitigating the detected threats in real time, often integrating with the network's firewall to prevent the spread of attacks.
Share our FREE glossary with your friends and study buddies.
Disclaimer: The glossary is for informational purposes only, we are not liable for any errors or omissions, if you find errors please contact us.