Data in Transit
Data actively moving across a network (e.g., email, web traffic). Protected via TLS or IPsec encryption.
Data at Rest
Data stored on physical media (e.g., SSDs, databases). Protected via Full Disk Encryption (FDE) or file-level encryption.
PKI (Public Key Infrastructure)
A system of digital certificates and Certificate Authorities (CA) that verify the identity of users and devices.
Self-Signed Certificate
A certificate signed by the same entity it identifies; cost-effective for internal testing but triggers browser warnings for public users.
MFA (Multifactor Authentication)
Security requiring 2+ factors: Something you KNOW (password), something you HAVE (token), or something you ARE (biometrics).
SSO (Single Sign-On)
An authentication method allowing a user to log in once and access multiple related but independent software systems.
RADIUS
A common AAA protocol used for network access (VPN, Wi-Fi). Encrypts only the password; uses UDP.
TACACS+
A Cisco-derived AAA protocol used for device administration. Encrypts the entire packet; uses TCP; separates AAA functions.
LDAP (Lightweight Directory Access Protocol)
The standard protocol used to query and modify information in directory service providers like Active Directory.
SAML (Security Assertion Markup Language)
An XML-based standard for exchanging authentication and authorization data between an Identity Provider and a Service Provider (used for Web SSO).
Least Privilege
The security principle of providing a user only the minimum level of access necessary to perform their job functions.
Role-Based Access Control (RBAC)
Assigning permissions based on a user’s job function (Role) rather than their individual identity.
Geofencing
Using GPS or IP location to create a virtual geographic boundary; can trigger alerts or block access if a device leaves the area.
Honeypot vs. Honeynet
A Honeypot is a single decoy system; a Honeynet is an entire network of decoys used to study attacker behavior.
CIA Triad
The core goals of security: Confidentiality (secrecy), Integrity (accuracy/no tampering), and Availability (uptime/access).
Risk vs. Vulnerability vs. Exploit
Vulnerability is a weakness; Exploit is the method of using that weakness; Risk is the potential for loss/damage.
PCI DSS / GDPR
PCI DSS: Standards for protecting credit card data. GDPR: Strict EU regulations regarding personal data privacy and locality.
OT / SCADA / ICS
Industrial systems that control physical infrastructure (power, water). Requires strict segmentation from the IT network.
Network Segmentation
Isolating different types of traffic (IoT, Guest, BYOD, Production) using VLANs and firewalls to prevent lateral movement of threats.