Malware
Network components
Protocols
Security Misc
Cryptography
100

Code that runs on a computer without the user’s knowledge. Infects the computer when the code is accessed and executed.

Virus

100

The most basic form of firewall that is rule based.

Stateless

100

A protocol that is used for file transfers using SSH for security

SFTP 

100

The act of quarantining of a system from its network surroundings

sandboxing

100

A simpler form of encryption where the sender and receiver both have the same key

Symmetric

200

A form of self-spreading malware that exploits system and application vulnerabilities to move between systems.

Worm

200

Specifically designed to filter HTTP and HTTPS traffic

Web application firewall (WAF)

200

A protocol used for securely browsing objects in an AD domain 

LDAPS

200

An OS designed to have as close to zero latency as possible

RTOS

200

Provide for message authenticity. Nonrepudiation

Digital signature

300

It collects information about the user without the user’s consent

Spyware

300

Network that functions as a subnetwork containing an organization's exposed, outward-facing services. It acts as the exposed point to an untrusted networks, commonly the Internet

DMZ

300

A protocol used to connect to a website secure

HTTPS

300

Sending unsolicited message to a Bluetooth enabled device

Bluejacking

300

Hiding secret data within an ordinary, non-secret, file or message in order to avoid detection

Steganography

400

Malicious software that is deliberately installed for a pre-programmed date

Logic Bomb

400

Provides a method of managing multiple separate VPN conversations, each isolated from the others and converting each encrypted stream to its unencrypted, plaintext form, on the network

VPN concentrator

400

A set of extensions to the DNS protocol that through the use of cryptography enables origin authentication of DNS

DNSSEC

400

Prevents data transfer but allows device charging

USB data blocker

400

The IEEE standard for wireless network security. Uses AES block cipher

WPA2

500

Encrypts files stored on a computer and demands payment by a third party

Ransomware/Crypto malware

500

A device that is an appliance, server, or application that accepts requests for access to resources on other servers and then applies filters, caches data, or translates the data that is returned.

Proxy

500

An encrypted program used for remote connections to a server using command line interface

SSH

500

Computing platforms are available through the cloud. You just supply the applications.

PaaS

500

Commonly referred to as “public key cryptography”

Asymmetric

M
e
n
u