Archives: Glossary Terms

Multi-factor authentication

A form of authentication in which a user is granted access only after providing two or more distinct credentials. The first form of authentication is often a password, the other...

Read More

Network slicing

As defined by NSA, a network slice is “an end-to-end logical network that provides specific network capabilities and characteristics to fit a user’s needs. Although multiple network slices run on...

Read More

Network telescope 

A system that observes large-scale events taking place on the Internet by observing traffic in a portion of the deep Web.

Read More

Network Time Protocol attack

A kind of distributed denial-of-service attack in which query packets to an NTP server are generated at a high rate.

Read More

Next-Gen Firewall

“A firewall that goes beyond port/protocol inspection and blocking to add application-level inspection and intrusion prevention. Industry convergence has resulted in a next generation firewall being functionally equivalent to an...

Read More

Next-generation firewall

A next-generation firewall (NGFW) is a hardware- or software-based network security system that detects and blocks sophisticated attacks by enforcing security policies at the application level in addition to the...

Read More

NMAP 

N-MAP A network mapping tool that pings IP addresses looking for a response and can discover host names, open communications ports, operating system names and versions.

Read More

North-South

Refers to network traffic between an IT environment and the public internet. Diagrams tend to show the internet above the IT environment.

Read More

Obfuscation

The practice of deliberately rendering software obscure, difficult to analyze and reverse engineer, and, above all, difficult to discern its actual function.

Read More

Octave

A security framework for determining risk and planning appropriate cyber defenses. OCTAVE (Operationally Critical Threat, Asset, and Vulnerability Evaluation) defines a method organizations can use to minimize their exposure to...

Read More