Editing
Network Security
(section)
Jump to navigation
Jump to search
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== <span style="color: #FFFFFF;">Remembering</span> == * '''Network Security''' β The policies and practices adopted to prevent and monitor unauthorized access, misuse, or denial of a computer network. * '''Firewall''' β A security device that monitors and filters incoming and outgoing network traffic based on an organization's previously established security policies. * '''VPN (Virtual Private Network)''' β A tool that creates an encrypted "Tunnel" over the public internet to protect your data and identity. * '''IP Address''' β A unique string of numbers that identifies each computer using the Internet Protocol to communicate over a network. * '''Port''' β A "Virtual Doorway" on a computer used for specific types of traffic (e.g., Port 80 for web, Port 22 for secure login). * '''Intrusion Detection System (IDS)''' β A device or software application that monitors a network for malicious activity or policy violations. * '''DDoS (Distributed Denial of Service)''' β An attack where multiple compromised systems flood a target network with traffic to crash it. * '''Phishing''' β A fraudulent attempt to obtain sensitive information by disguising as a trustworthy entity in electronic communication. * '''Man-in-the-Middle (MitM)''' β An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating. * '''Encryption (In Transit)''' β Protecting data while it is moving across the network (e.g., HTTPS). * '''Zero Trust''' β A security model that requires all users, whether in or out of the network, to be authenticated and validated before being granted access. * '''DMZ (Demilitarized Zone)''' β A physical or logical subnetwork that contains an organization's external-facing services (like a website) to keep the internal network safe. * '''Encryption (At Rest)''' β Protecting data while it is stored on a disk or database. * '''MAC Address''' β A unique identifier assigned to a network interface controller (NIC) for communications at the data link layer. </div> <div style="background-color: #006400; color: #FFFFFF; padding: 20px; border-radius: 8px; margin-bottom: 15px;">
Summary:
Please note that all contributions to BloomWiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
BloomWiki:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Navigation menu
Personal tools
Not logged in
Talk
Contributions
Create account
Log in
Namespaces
Page
Discussion
English
Views
Read
Edit
View history
More
Search
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Tools
What links here
Related changes
Special pages
Page information