Skip to content

System and Network Security Glossary

13 essential terms — because precise language is the foundation of clear thinking in System and Network Security.

Showing 13 of 13 terms

An attack technique where an adversary sends falsified ARP messages on a local network to associate their MAC address with another host's IP address, enabling traffic interception.

A perimeter network segment that hosts public-facing services while isolating them from the internal network, typically protected by firewalls on both sides.

A network security device or software that monitors and filters network traffic based on security rules, acting as a barrier between trusted and untrusted networks.

A property of key exchange protocols ensuring that compromise of a long-term key does not compromise past session keys, because each session uses unique ephemeral keys.

A security system that monitors network traffic or system activities for suspicious behavior and generates alerts without taking active blocking action.

A security system deployed inline that monitors traffic and actively blocks or prevents detected threats in real time.

A suite of protocols operating at Layer 3 that provides encryption (ESP), authentication (AH), and key management (IKE) for securing IP communications.

A security framework that evaluates a device's security posture and enforces compliance policies before granting network access.

An access control model that assigns permissions to organizational roles rather than individual users, simplifying permission management in large organizations.

A platform that aggregates and correlates log data from multiple IT sources to detect security threats, generate alerts, and support incident investigation.

A cryptographic protocol that provides secure communication over a network through encryption, authentication via digital certificates, and data integrity.

A technology that creates an encrypted tunnel over a public network, providing secure communication between endpoints through encryption, authentication, and integrity protection.

A security model based on 'never trust, always verify,' requiring continuous authentication and authorization for every access request regardless of network location.

System and Network Security Glossary - Key Terms & Definitions | PiqCue