N Flashcards
NAC
Network Access Control
The process of restricting unauthorized users and devices from gaining access to a corporate or private network. NAC ensures that only users who are authenticated and devices that are AUTHORIZED AND COMPLIANT with security policies can enter the network.
It can deny network access to noncompliant devices, place them in a quarantined area, or give them only restricted access to computing resources, thus keeping insecure nodes from infecting the network.
It can also manage network guests through a guest management portal. It evaluates security policy compliance by user type, device type, and OS. It mitigates network threats by enforcing security policies that block, isolate, and repair noncompliant machines without administrator attention.
NAT
Network Address Translation
A way to map multiple private addresses inside a local network to a single public IP address before transferring the information onto the internet.
NDA
Non-Disclosure Agreement
A legal agreement which defines information that the parties wish to protect from dissemination and outlines restrictions on use.
NFC
Near Field Communication
A short-range wireless technology that lets NFC-enabled devices communicate with each other.
It allows your phone to act as a transit pass or credit card, quickly transfer data, or instantly pair with Bluetooth devices like headphones and speakers.
NGFW
Next-Generation Firewall
A network security device that provides capabilities beyond a traditional, stateful firewall.
While a traditional firewall typically provides stateful inspection of incoming and outgoing network traffic, a next-generation firewall includes additional features like application awareness and control, integrated intrusion prevention, and cloud-delivered threat intelligence.
NIDS
Network-based Intrusion Detection System
A device or a program that monitors a given system or a network for malicious activity or policy violations.
NIPS
Network-based Intrusion Prevention System
A type of network security software that detects malicious activity on a network, reports information about said activity, and automatically blocks or terminates the activity.
NIST
National Institute of Standards and Technology
A United States government laboratory that works to develop, test, and recommend best practices for federal agencies, and other organizations relating to things such as online security.
NTFS
New Technology Filesystem
A process that the Windows NT operating system uses for storing, organizing, and finding files on a hard disk efficiently.
NTLM
New Technology LAN Manager
This legacy technology has been replaced by Kerberos as the default authentication protocol. It is mainly only used to maintain compatibility with legacy clients and servers.
A suite of security protocols offered by Microsoft to authenticate users’ identity and protect the integrity and confidentiality of their activity.
A single sign on (SSO) tool that relies on a challenge-response protocol to confirm the user without requiring them to submit a password.
NTP
Network Time Protocol
An internet protocol used to synchronize with computer clock time sources in a network.