Home / Cybersecurity Glosarry / N is for Network

N is for Network

nanotechnology – incredibly small products and devices manufactured through the manipulation of items as small as atoms and molecules.

NAS – Network attached storage. A digital repository attached to a network where information can be stored.

National Institute for Cybersecurity Education (NICE) – a US government initiative to help enhance the training and resources for the defense of digital technologies and the electronic information they contain and transact.

networks – the group name for a collection of devices, wiring and applications used to connect, carry, broadcast, monitor or safeguard data. Networks can be physical (use material assets such as wiring) or virtual (use applications to create associations and connections between devices or applications.)

Network-based Intrusion Prevention Systems (NIPS) – see Intrusion Prevention Systems.

network forensics – a part of the digital forensics discipline, focused on being able to investigate and uncover evidence. This includes rebuilding and recovering electronic information from the devices used to connect and carry information between endpoints. Advances in defensive technology can now allow (for example) for all communicated data packages to be captured for a period of time. Where this technology is in place, even if the sending and receiving endpoint devices are initially unknown, information about what took place can still be acquired because the incoming and outgoing data packages that were communicated can be replayed in full. See also indicators of compromise.

network segmentation – splitting a single collection of devices, wiring and applications that connect, carry broadcast, monitor or safeguard data, into smaller sections. This allows for more discrete management of each section, allowing greater security to be applied in sections of the highest value and also enabling smaller sections to be impacted in the event of a malware infection or other disruptive event.

network traffic analysis – the act of recording, reviewing and inspecting key information about the data that is transacted over digital devices and infrastructure used to connect and transport electronic information. This technique is used extensively by intrusion detection and prevention systems and other network security sensors. The information collected can also be used towards advanced threat detection and digital forensics as an indicator of compromise.

NGFW – Next Generation Firewall is an integrated network platform that combines a traditional firewall with other network device filtering functionalities such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS) and/or other techniques such as SSL and SSH interception, website filtering, QoS/bandwidth management, antivirus inspection and third-party integration (i.e. Active Directory). Gartner defines an NGFW as “a wire-speed integrated network platform that performs deep inspection of traffic and blocking of attacks.”

non-repudiation – the act of ensuring that a users electronic activity has sufficient identity checks and audit evidence in place so that it cannot be refuted or denied by the person performing the action.

INDEX ] [ # ] [ A ] [ B ] [ C ] [ D ] [ E ] [ F ] [ G ] [ H ] [ I ] [ J ] [ K ] [ L ] [ M ] [ N ] [ O ] [ P ] [ Q ] [ R ] [ S ] [ T ] [ U ] [ V ] [ W ] [ X ] [ Y ] [ Z ]