Netmaker Glossary

Glossary

A

Access Policies

Access Policies

Access Policies are sets of rules and guidelines that control who can access specific resources, systems, or data within a network.

Adaptive Authentication

Adaptive Authentication

Adaptive authentication is a method used to verify a user's identity and authorization levels dynamically based on a variety of contextual factors.

Adaptive Security

Adaptive Security

Adaptive Security is an advanced method of protecting systems, networks, and data by constantly assessing and adjusting to potential threats.

Authenticated Encryption with Associated Data (AEAD)

Authenticated Encryption with Associated Data (AEAD)

Authenticated Encryption with Associated Data (AEAD) is a form of encryption that simultaneously safeguards the confidentiality and authenticity of digital data.

B

Bandwidth Throttling

Bandwidth Throttling

Bandwidth Throttling is a deliberate act of slowing down the internet speed within a local network by administrators.

Bypass Firewall Rules

Bypass Firewall Rules

Bypass Firewall Rules refers to the techniques or methods used to evade the restrictions and controls imposed by a firewall in a network.

C

CIDR (Classless Inter-Domain Routing)

CIDR (Classless Inter-Domain Routing)

CIDR (Classless Inter-Domain Routing) is a method used for allocating IP addresses and for IP routing.

Certificate Authority (CA)

Certificate Authority (CA)

A Certificate Authority (CA) is an essential part of internet security, acting as a trusted third party that issues digital certificates.

ChaCha20 Encryption

ChaCha20 Encryption

ChaCha20 Encryption is a high-speed stream cipher that provides strong security measures for digital communications.

Cloud Gateway

Cloud Gateway

A Cloud Gateway is a networking component designed to facilitate secure communication between devices in a local network and cloud-based services or resources.

Cloud Security Posture Management (CSPM)

Cloud Security Posture Management (CSPM)

Cloud Security Posture Management (CSPM) is a set of tools and practices designed to improve the security of cloud environments.

Cloud VPN

Cloud VPN

A Cloud VPN, also known as a Virtual Private Network as a Service (VPNaaS), is a type of VPN that offers a secure and encrypted connection over the Internet from a device to a network, utilizing cloud-based network infrastructure.

Connection Aggregation

Connection Aggregation

Connection aggregation is a term that refers to the process of combining multiple network connections into a single, more robust and efficient connection.

Connection Handshake

Connection Handshake

A "Connection Handshake" is a process used in networking to establish a secure and efficient connection between two devices or systems.

Contextual Access

Contextual Access

Contextual Access refers to a security approach where the access to information or resources within a network is granted based on various situational factors rather than just static credentials like usernames and passwords.

Cryptokey Routing

Cryptokey Routing

Cryptokey Routing is a core concept within the WireGuard VPN framework that serves as a unique approach to managing network traffic through encrypted tunnels.

D

DHCP (Dynamic Host Configuration Protocol)

DHCP (Dynamic Host Configuration Protocol)

DHCP, short for Dynamic Host Configuration Protocol, is an essential networking protocol used within various types of networks to automatically assign IP addresses and other network configurations to devices, thereby enabling them to communicate effectively over the network.

DNS (Domain Name System)

DNS (Domain Name System)

DNS stands for Domain Name System, a core component of the internet that translates human-friendly domain names like "netmaker.

Datagram Transport Layer Security (DTLS)

Datagram Transport Layer Security (DTLS)

Datagram Transport Layer Security (DTLS) is a communications protocol designed to provide secure data transmission between devices over the Internet.

Device Posture

Device Posture

Device Posture refers to the overall security status and compliance of a device, such as a computer, smartphone, or tablet, concerning an organization's security policies.

Device Provisioning Protocol (DPP)

Device Provisioning Protocol (DPP)

The Device Provisioning Protocol (DPP) is a modern, secure method designed to simplify the process of connecting devices to Wi-Fi networks, especially focusing on Internet of Things (IoT) devices that often have limited or no user interfaces.

Dynamic IP Management

Dynamic IP Management

Dynamic IP Management refers to the process of automatically assigning and managing IP addresses from a pool of available addresses to devices on a network.

Dynamic Multipoint VPN (DMVPN)

Dynamic Multipoint VPN (DMVPN)

Dynamic Multipoint VPN (DMVPN) is a secure and dynamic network platform designed to simplify the creation of large-scale virtual private networks (VPNs).

Dynamic Trust Evaluation

Dynamic Trust Evaluation

Dynamic Trust Evaluation is a method used in computer networks and cybersecurity to continually assess and validate the trustworthiness of devices, users, and systems.

E

Edge Device

Edge Device

An edge device is a type of hardware that serves as a connection point between different networks or between a network and the internet.

Egress

Encapsulated Security Payload (ESP)

Encapsulated Security Payload (ESP)

Encapsulated Security Payload (ESP) is a security protocol used to provide confidentiality, as well as optional integrity, authentication, and replay protection for data communications over an IP network.

Encryption

Encryption

Encryption is a method of protecting data by transforming it into a format that cannot be easily understood by unauthorized individuals.

Endpoint Compliance

Endpoint Compliance

Endpoint compliance refers to the practice of ensuring that all endpoint devices within a network adhere to the required security configurations and standards.

Endpoint Protection Platform (EPP)

Endpoint Protection Platform (EPP)

An Endpoint Protection Platform (EPP) is a comprehensive cybersecurity solution designed to safeguard the devices connected to an organization's network.

Endpoint Security

Endpoint Security

Endpoint security refers to safeguarding endpoints or entry points of end-user devices like desktop computers, laptops, mobile devices, and even IoT (Internet of Things) devices from cyber threats.

Endpoint Verification

Endpoint Verification

Endpoint Verification is a security process used to ensure that devices connecting to a network or service meet certain predefined security criteria before they're allowed access.

F

Fast Retransmit

Fast Retransmit

Fast Retransmit is a fundamental term in the field of computer networking, specifically within the context of the Transmission Control Protocol (TCP), which is widely used for transferring data across the internet and other networks.

Firewall

Firewall

A firewall is a network security tool that acts as a barrier between an internal, secured network and external, untrusted networks such as the internet.

Forward Secrecy

Forward Secrecy

Forward secrecy, often known as perfect forward secrecy (PFS), is a security feature of certain key agreement protocols that ensures a session's encryption keys cannot be compromised even if the private key of the server is compromised in the future.

Full Tunneling

Full Tunneling

Full Tunneling is a networking concept often utilized within the framework of Virtual Private Networks (VPNs) to enhance privacy and security across internet connections.

G

GRE Tunneling (Generic Routing Encapsulation)

GRE Tunneling (Generic Routing Encapsulation)

GRE Tunneling, or Generic Routing Encapsulation, is a network protocol designed to encapsulate a wide variety of network layer protocols inside virtual point-to-point links or tunnel interfaces over an Internet Protocol network.

H

HMAC (Hash-Based Message Authentication Code)

HMAC (Hash-Based Message Authentication Code)

HMAC, short for Hash-Based Message Authentication Code, is a specific technique used in computer science to ensure both the integrity and the authenticity of a message between two parties.

Hybrid VPN

Hybrid VPN

A Hybrid VPN is a type of networking solution that blends the features of traditional Virtual Private Network (VPN) technology with other networking methods to provide enhanced flexibility, scalability, and security for data transmission across the internet.

I

IKEv2 (Internet Key Exchange version 2)

IKEv2 (Internet Key Exchange version 2)

IKEv2, short for Internet Key Exchange version 2, is an updated protocol designed to ensure secure key exchange over the internet.

IP Addressing

IP Addressing

In the world of interconnected devices, IP Addressing stands as a fundamental concept that ensures every device communicating over a network can be uniquely identified and reached.

IP Whitelisting

IP Whitelisting

IP whitelisting is a security measure used to control access to a network, system, or specific services by allowing only pre-approved IP addresses to connect.

IPsec (Internet Protocol Security)

IPsec (Internet Protocol Security)

IPsec (Internet Protocol Security) is a framework of open standards for ensuring private, secure communications over Internet Protocol (IP) networks through the use of cryptographic security services.

IPv6 Support

IPv6 Support

IPv6 support refers to the ability of networks, devices, software, and services to use and handle IPv6 addresses.

Identity Governance

Identity Governance

Identity Governance refers to a set of policies, processes, and technologies designed to manage and control user identities and their access to various resources within an organization.

Identity Management

Identity Management

Identity Management refers to the processes, technologies, and policies used to manage and secure information about users and their access to systems and resources.

Incident Response

Incident Response

Incident Response refers to the organized method used by an organization to manage and address the aftermath of a security breach or cyberattack.

Ingress

J

Just-In-Time Access

Just-In-Time Access

Just-In-Time Access, also known as JIT access, is a security measure used to enhance the protection of sensitive systems and data.

K

Key Distribution Center (KDC)

Key Distribution Center (KDC)

A Key Distribution Center (KDC) is a critical component in network security that plays a vital role in managing the secret keys used for secure communication between devices and services.

L

Latency

Latency

Latency, often referred to as network latency, is a crucial concept in telecommunications and computer networking that describes the amount of delay or time it takes for a data packet to travel from one designated point to another within a network.

Layer 3 Routing

Layer 3 Routing

Layer 3 routing is a network process that uses IP addresses to decide how to forward data packets from their source to their destination across multiple networks or internetworks.

Least Privilege

Least Privilege

Least privilege is a fundamental principle in information security and computer science that ensures users, applications, and systems operate with the minimum level of access necessary for their roles.

M

MPLS (Multiprotocol Label Switching)

MPLS (Multiprotocol Label Switching)

MPLS, short for Multiprotocol Label Switching, is an advanced method for streamlining network traffic flows across enterprise and service provider networks.

Managed VPN Service

Managed VPN Service

A Managed VPN Service is a specialized offering provided by network service providers or IT firms, focusing on setting up and maintaining a Virtual Private Network (VPN) for clients.

Mesh VPN

Mesh VPN

A Mesh VPN is a type of Virtual Private Network (VPN) architecture designed to create a secure and dynamic network connection among multiple nodes or devices across various locations.

Micro-Segmentation

Micro-Segmentation

Micro-segmentation is a security technique used in computer networks to divide a network into smaller, isolated segments.

Multi-Factor Authentication (MFA)

Multi-Factor Authentication (MFA)

Multi-Factor Authentication (MFA) is a security system that requires more than one form of verification from users to prove their identity and gain access to online accounts, applications, or other digital resources.

N

NAT (Network Address Translation)

NAT (Network Address Translation)

Network Address Translation (NAT) is a critical and widely used technique in the world of networking that allows multiple devices on a local network to communicate with devices on the internet using a single public IP address.

NAT Traversal (NAT-T)

NAT Traversal (NAT-T)

NAT Traversal (NAT-T) is a technology designed to establish and maintain Internet connections between devices that are each located behind a Network Address Translation (NAT) gateway.

Network Access Control (NAC)

Network Access Control (NAC)

Network Access Control (NAC) is a security solution crucial for maintaining the safety and integrity of a corporate network.

Network Anomaly Detection

Network Anomaly Detection

Network Anomaly Detection is a technique used to monitor, analyze, and identify unusual patterns or activities within a computer network.

Network Fabric

Network Fabric

A Network Fabric represents an advanced approach to connecting different parts of a computer network, including devices like routers, switches, and access points, in a way that allows data to seamlessly navigate through the network to reach its destination.

Network Isolation

Network Isolation

Network isolation is a security method used to separate different parts of a computer network from one another.

Network Jitter Control

Network Jitter Control

Network jitter control refers to the techniques and methods used to manage and minimize jitter within a digital network.

Network Perimeter

Network Perimeter

A network perimeter is the boundary that separates an organization's internal network from the outside world, including the internet and other external networks.

Network Protocols

Network Protocols

Network protocols are sets of rules and standards that dictate how devices on a network communicate, share data, and ensure efficient and secure data transfer across the internet or a private network.

Network Security

Network Security

Network security is a comprehensive term that describes a range of policies, practices, and tools designed to protect digital networks and data from unauthorized access, misuse, attacks, or other security threats.

Network Slicing

Network Slicing

Network Slicing is a versatile and innovative technology used in modern networking and telecommunications sectors to create multiple unique, logical, and virtual networks over a single physical network infrastructure.

Network Topology

Network Topology

Network topology refers to the arrangement of different elements (nodes, links, etc.

Network Trust Levels

Network Trust Levels

Network Trust Levels are security measures employed to determine and manage the access different users, devices, or applications have within a network.

Network Virtualization

Network Virtualization

Network virtualization is a transformative technology that redefines how network resources are managed, deployed, and utilized in a digital environment.

Networking VPN

Networking VPN

A networking VPN, from a remote access VPN to a site-to-site VPN, allows you to connect your company's devices in a secure way.

O

P

Peer-to-Peer Network

Peer-to-Peer Network

A Peer-to-Peer (P2P) network is a decentralized communication model that allows each participating device, also known as a peer, to connect and share resources without requiring a central server.

Policy Enforcement Point

Policy Enforcement Point

A Policy Enforcement Point (PEP) is a crucial part of a security system that controls access to resources within a network.

Q

Quality of Service (QoS)

Quality of Service (QoS)

Quality of Service (QoS) is a critical concept in networking that refers to the overall performance of a network or internet service, focusing on its ability to deliver data efficiently and effectively.

R

Remote Access VPN

Remote Access VPN

A Remote Access VPN (Virtual Private Network) is a technology that allows individuals to securely connect to a private network from a remote location over the internet.

Remote User Authentication

Remote User Authentication

Remote User Authentication is a security process that allows users to verify their identity to access a system or network from a different location than the system's physical location.

Risk Mitigation

Risk Mitigation

Risk mitigation is a strategy used to prepare for and reduce the impact of potential dangers that could negatively affect a project, organization, or individual.

Risk-Based Authentication

Risk-Based Authentication

Risk-Based Authentication (RBA) is a security measure that evaluates the potential risk of a login attempt or other access-related activity in real-time.

Role-Based Access Control (RBAC)

Role-Based Access Control (RBAC)

Role-Based Access Control (RBAC) is a way to manage who can access certain parts of a computer system or network.

S

Star us on GitHub
By clicking “Accept”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. View our Privacy Policy for more information.