Encyclopedia of Cybersecurity

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

National Institute of Standards and Technology Framework

The National Institute of Standards and Technology (NIST) Framework, officially known as the NIST Framework for Improving Critical Infrastructure Cybersecurity, is a voluntary framework primarily intended for critical infrastructure organizations to manage and mitigate cybersecurity risk. Developed by the United States’ National Institute of Standards and Technology, the framework was created through collaboration between industry […]

National Institute of Standards and Technology Framework Read More »

Network Access Control

Network Access Control (NAC) is a security solution designed to regulate and manage access to a network based on the identity, security posture, and compliance status of devices seeking to connect. NAC systems enforce security policies and controls to ensure that only authorized and compliant devices are granted access to network resources, while unauthorized or

Network Access Control Read More »

Network Access Point

A Network Access Point (NAP) is a physical location or facility where multiple network providers, carriers, and internet service providers (ISPs) interconnect their networks to exchange traffic and facilitate data communication between different networks and autonomous systems. NAPs serve as key points of presence within the internet infrastructure, allowing network operators to establish peering agreements,

Network Access Point Read More »

Network and Information Systems Directive

The Network and Information Systems Directive (NIS Directive) is a European Union (EU) directive aimed at enhancing the cybersecurity posture of critical infrastructure operators and digital service providers across EU member states. Adopted in July 2016, the NIS Directive is the first EU-wide legislation on cybersecurity and is part of the EU’s broader cybersecurity strategy.

Network and Information Systems Directive Read More »

Network Detection and Response

Network Detection and Response (NDR) is a cybersecurity approach focused on detecting and responding to threats and suspicious activities within an organization’s network infrastructure. NDR solutions continuously monitor network traffic to identify malicious behavior, anomalies, and security incidents, enabling organizations to detect and mitigate threats in real-time. Key aspects of Network Detection and Response include:

Network Detection and Response Read More »

Network Forensics

Network Forensics is the process of capturing, analyzing, and investigating network traffic and communication patterns to uncover evidence of security incidents, cyber attacks, or unauthorized activity within a computer network. It involves the examination of network packets, logs, and other digital artifacts to reconstruct the sequence of events, identify the root cause of security breaches,

Network Forensics Read More »

Network Level Authentication

Network Level Authentication (NLA) is a security feature introduced in Microsoft Windows operating systems. It requires authentication of users before establishing a remote desktop session over the network. Unlike earlier versions of Remote Desktop Protocol (RDP), which perform authentication during the connection process, NLA requires the client to authenticate with the server before a remote

Network Level Authentication Read More »

Network Packet Inspection

Network Packet Inspection, also known as Packet Sniffing or packet analysis, is the process of capturing and examining the contents of data packets flowing over a network. It involves intercepting network traffic, analyzing packet headers and payloads, and extracting information to gain insights into network activity, troubleshoot network issues, and detect security threats. Key aspects

Network Packet Inspection Read More »

Network Probe

A network probe, often referred to simply as a probe, is a type of monitoring tool used in computer networks to collect data about network traffic, performance, and security. Probes passively or actively monitor network traffic, capturing packets, analyzing protocols, and providing valuable insights into network behavior, usage patterns, and potential issues. Key characteristics and

Network Probe Read More »

Network Security

Network security refers to the policies, practices, technologies, and measures implemented to protect computer networks, systems, and data from unauthorized access, misuse, modification, or disruption. Network security aims to ensure the confidentiality, integrity, and availability of network resources and data, as well as to prevent unauthorized users or malicious actors from compromising the security of

Network Security Read More »

Scroll to Top