Network Security Terms
141 terms
Protection for additive manufacturing.
Specialized security measures developed to address the increased complexity and speed of 5G networks.
Dynamic partitioning of networks based on real-time risk assessments and threat intelligence.
Protection for aircraft production.
Protection for farming UAVs.
Protection for farming IoT devices.
Measures to improve the security and reliability of networks designed to provide anonymous communications.
Techniques designed to secure the access points of application programming interfaces from unauthorized use.
Systems that monitor and safeguard API endpoints from unauthorized access and cyber attacks.
Security measures focusing on protecting application infrastructure from sophisticated DDoS attacks.
Protection for historical sites.
Protection for telescope systems.
Strategies aimed at minimizing potential entry points for cyber attackers by tightening system exposure.
Protection for AR applications.
Protection for car manufacturing.
Structured security approaches specifically designed for protecting modern, connected vehicles.
Protection for aircraft systems.
Protection for energy storage.
Protection for drink manufacturing.
Protection of blockchain network nodes.
Established blockchain protection guidelines.
Protection for chemical facilities.
Protection for temperature-controlled logistics.
Protection for building sites.
Specialized strategies for protecting vital systems and services that underpin national security.
Comprehensive approaches for defending essential services and national infrastructure against cyber threats.
Methods for protecting systems that integrate physical processes with digital control systems.
Automated defenses designed to detect and neutralize distributed denial-of-service attacks quickly.
Protection of dApp environments.
Protection of peer-to-peer trading platforms.
Protection of DeFi platforms and transactions.
Protection of DAO voting systems.
Protection of blockchain protocols.
Protection for diplomatic communications.
Protection for logistics hubs.
Protocol enhancements that secure the Domain Name System from tampering and spoofing.
Protection mechanisms for UAV systems.
Security guidelines designed to protect data processing that occurs at the edge of the network.
Protection for learning platforms.
Protection for device manufacturing.
Security practices focused on protecting the hardware and software of embedded devices.
Security design for embedded devices.
Strategies designed to address novel vulnerabilities and attacks targeting Internet of Things devices.
Techniques for analyzing patterns in encrypted data flows to identify potential security concerns.
Protection for power distribution networks.
Protection for media systems.
Protection for climate monitoring.
Network security system monitoring traffic to block unauthorized access based on preset rules.
Security strategies to protect intermediary devices that bridge cloud and edge computing environments.
Protection for food production.
Protection for forestry systems.
Protection for gaming systems.
Protection for seismic networks.
Guidelines and techniques designed to secure GraphQL APIs against potential vulnerabilities.
Physical security root of trust implementation.
Security solutions designed to remain operational even during system failures or heavy attack loads.
Security for hotel systems.
Advanced protocols and tools designed to safeguard critical industrial control systems.
Communication standards for industrial systems.
Security measures that enforce policies based on the intended operational outcomes of network configurations.
Protection for stock systems.
Continuous surveillance of Internet of Things devices to detect deviations from normal operation.
Unique identification of Internet of Things devices.
Protection for research facilities.
Protection for final delivery.
Protection for animal tracking.
Security for industrial manufacturing.
Protection for ocean systems.
Security for shipping systems.
Protection for material analysis.
Healthcare equipment protection.
Dividing a network into smaller, isolated segments to prevent lateral movement in the event of a breach.
Protection for military connected devices.
Protection for mining systems.
A comprehensive security framework that employs multiple overlapping layers of protection.
Protection for cultural institutions.
Establishing normal operating metrics for network traffic to more easily spot deviations.
Systems that monitor network traffic for deviations from established norms indicative of attacks.
Security solutions that use non-signature-based techniques to detect and investigate threats.
Protecting virtualized network functions through specialized security protocols and monitoring.
Passive monitoring solution analyzing network traffic patterns for suspicious activity.
Detailed rules that govern the division of networks into secure, isolated segments.
Automated solutions that continuously monitor and analyze network traffic for signs of malicious activity.
Analyzing patterns in encrypted network traffic to detect anomalies without needing to decrypt the data.
Protection for nuclear systems.
Protection for offshore facilities.
Dividing OT networks into secure segments to contain breaches and limit lateral movement.
Protection for packaging systems.
Protection for parking facilities.
Protection for physics research.
Protection for drug manufacturing.
Combining physical and digital security.
Protection for detailed production.
Protection for emergency services.
Protection for inspection systems.
Protection for space observation.
Protection for train production.
Protection for rail control systems.
The immediate collection and analysis of network data to identify and mitigate ongoing attacks.
Protection for material recovery.
Protection for retail systems.
Protection for product returns.
Security for automated processes.
Protection for robot manufacturing.
Techniques to secure satellite links and ground station communications from cyber threats.
Protection for space-based communications.
Monitoring techniques that identify unusual behavior in SCADA communications to prevent attacks.
Network architectures designed to automatically recover from or adapt to cyber incidents.
Protection for chip production.
Protection mechanisms for IoT sensors.
Protection for ship building.
Protection for automated building systems.
Protection for urban IoT networks.
Protection for automated farming.
Security measures specifically tailored to protect interconnected smart home devices and networks.
Securing networks managed by software controllers that dynamically configure network resources.
A security framework that dynamically creates boundaries around network resources to minimize exposure.
Protection for solar energy systems.
Protection for space-based systems.
Protection for stadium systems.
Protection for logistics tracking.
Protection for clothing production.
Security measures based on temporal factors.
Protection for traffic management.
Protection for transit centers.
Protection for submarine systems.
Protection for automotive networks.
Security protocols that protect communications between vehicles and other connected systems.
Techniques to analyze the scale and source of high-volume DDoS attacks for effective response.
The process of optimizing web application firewall settings to better block malicious traffic while reducing false posit…
Protection for storage facilities.
Protection for waste handling systems.
Protection for disposal systems.
Protection for water systems.
Protection for wearable technology.
Protection for meteorological systems.
Established blockchain security guidelines.
Protection for animal monitoring.
Protection for wind energy systems.
Tools designed to detect and block unauthorized access to wireless networks.
An approach that continuously verifies the security posture of endpoints before granting them network access.