Malware
Network components
Protocols
Security Misc
Cryptography
100

Code that runs on a computer without the user’s knowledge. Infects the computer when the code is accessed and executed.

Virus

100

The most basic form of firewall that is rule based.

Stateless

100

A protocol that is used for file transfers using SSH for security

SFTP 

100

The act of quarantining of a system from its network surroundings

sandboxing

100

A simpler form of encryption where the sender and receiver both have the same key

Symmetric

200

A form of self-spreading malware that exploits system and application vulnerabilities to move between systems.

Worm

200

Specifically designed to filter HTTP and HTTPS traffic

Web application firewall (WAF)

200

A protocol used for securely browsing objects in an AD domain 

LDAPS

200

An OS designed to have as close to zero latency as possible

RTOS

200

Provide for message authenticity. Nonrepudiation

Digital signature

300

It collects information about the user without the user’s consent

Spyware

300

Network that functions as a subnetwork containing an organization's exposed, outward-facing services. It acts as the exposed point to an untrusted networks, commonly the Internet

DMZ

300

A protocol used to connect to a website secure

HTTPS

300

A security exploit in which the attacker seeks to compromise a specific group of end users by infecting websites that members of the group are known to visit

Waterhole Attack

300

Hiding secret data within an ordinary, non-secret, file or message in order to avoid detection

Steganography

400

Malicious software that is deliberately installed for a pre-programmed date

Logic Bomb

400

Cisco proprietary AAA server and protocol 

TACACS+ Terminal Access Controller Access-Control System 

400

RADIUS ports numbers

1812 and 1813

400

A server that provides a single point of access from an external network to the resources located in a private network

Jumpbox

400

The IEEE standard for wireless network security. Uses AES block cipher

WPA2

500

Encrypts files stored on a computer and demands payment by a third party

Ransomware/Crypto malware

500

A device that is an appliance, server, or application that accepts requests for access to resources on other servers and then applies filters, caches data, or translates the data that is returned.

Proxy

500

An encrypted program used for remote connections to a server using command line interface

SSH

500

Computing platforms are available through the cloud. You just supply the applications.

PaaS

500

Commonly referred to as “public key cryptography”

Asymmetric