CyberGlossary

Learn more about network security topics with our CyberGlossary

 Cybersecurity

Cybersecurity

Cybersecurity encompasses every measure taken to defend an organization from a cyber attack, unauthorized access, or data damage or loss. This includes processes, technologies, architectures, and even user education.

Firewall

Firewall

A firewall is the key component of network security, acting as the guard against malicious traffic, data loss, and unauthorized access. Traditionally, a firewall was put at the perimeter to determine which traffic to let into the network and which to keep out. Today, it’s recommended to have a firewall at the core of your network as well, such as an internal segmentation firewall, as threats do slip in and spread. A firewall platform can be hardware, software, or a combination. 

Network Security

Network Security

Network security refers to the technologies and policies used to defend any network, network traffic, and network-accessible assets from cyber attacks, unauthorized access, and data loss. It must protect at both the edge and inside the network, with a layered approach.

IoT Security

IoT Security

IoT security is the act of securing Internet of Things devices and the networks they’re connected to. In the business setting, IoT devices include industrial machines, smart energy grids, building automation, plus whatever personal IoT devices employees bring to work.

Ransomware

Ransomware

Ransomware is a type of malware that locks a victim’s computer and holds its contents for ransom. The victim must pay to unlock their system. They’ll receive a pop-up message or email with instructions. The ransom is typically demanded in bitcoin so the criminal can remain anonymous.

Cloud Security

Cloud Security

Cloud security protects the cloud infrastructure and everything in it. Responsibility for cloud security varies depending on the type of cloud. Cloud environments increase an organization’s attack surface and require security that can keep up with the agility and flexibility of these environments. In addition, to effectively monitor events, visibility throughout the network must be available, not just for one isolated cloud.