Cybersecurity Glossary

1506 essential cybersecurity terms explained. Your reference guide from A to Z.

1506Terms
A–ZIndexed
All A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
N
NAC
Network Access Control. A security approach that enforces policies on devices seeking to access network resources, verifying compliance before granting access.
Network Segmentation
The practice of dividing a computer network into smaller subnetworks to improve security by limiting lateral movement and containing breaches.
NAT
Network Address Translation. A method of modifying network address information in IP packet headers while in transit, commonly used to map private addresses to public ones.
Network Forensics
The capture, recording, and analysis of network traffic to investigate security incidents, policy violations, and criminal activity.
NetFlow
A network protocol developed by Cisco for collecting IP traffic information and monitoring network flow, widely used for network traffic analysis and security monitoring.
Nonce
Number used once. A random or pseudo-random value used in cryptographic communications to prevent replay attacks and ensure that old communications cannot be reused.
NTLM Relay
An attack that captures NTLM authentication attempts and relays them to another server, allowing the attacker to authenticate as the victim on the target system.
Nmap
Network Mapper. An open-source tool used for network discovery and security auditing, capable of host discovery, port scanning, service detection, and OS fingerprinting.
Nikto
An open-source web server scanner that performs comprehensive tests against web servers for multiple known vulnerabilities, misconfigurations, and outdated software.
NIST
National Institute of Standards and Technology. A US agency that develops cybersecurity standards, guidelines, and best practices for federal and private sector organizations.
NIST CSF
NIST Cybersecurity Framework. A voluntary framework providing guidance for managing and reducing cybersecurity risk based on existing standards and best practices.
Network TAP
A hardware device inserted at a specific point in a network to monitor traffic in real time, providing a copy of network data for analysis and security monitoring.
NTP
Network Time Protocol. A protocol for synchronizing clocks of computer systems over packet-switched networks, critical for accurate security log timestamps.
North-South Traffic
Network traffic that flows between a data center and external networks, typically passing through perimeter security controls.
Network Topology
The arrangement of nodes and connections in a computer network, including physical and logical layouts that affect security posture.
Network ACL
Access Control List. A set of rules applied to network interfaces that filter traffic based on source and destination addresses, ports, and protocols.
Next-Generation Firewall
An advanced firewall that combines traditional firewall capabilities with application awareness, intrusion prevention, and cloud-delivered threat intelligence.
Network Pivoting
A technique where an attacker uses a compromised system as a relay point to access other systems on the same network that are not directly accessible.
NTLM
NT LAN Manager. A suite of Microsoft security protocols for authentication, integrity, and confidentiality, largely superseded by Kerberos but still present in legacy systems.
NIST Cybersecurity Framework
A voluntary framework developed by NIST that provides guidelines for managing and reducing cybersecurity risk based on existing standards.
NIS2 Directive
Network and Information Security Directive 2. An EU directive that establishes cybersecurity requirements for essential and important entities across member states.
NFC Attack
Attacks targeting Near Field Communication technology, including eavesdropping, data manipulation, and relay attacks on contactless payments and access cards.
Need to Know
A security principle where access to information is restricted to individuals who require it to perform their specific duties or roles.
NTP Amplification
A DDoS attack leveraging Network Time Protocol servers to amplify traffic directed at a target using the monlist command.
Network Telescope
A large block of unused IP addresses monitored to observe unsolicited traffic patterns, scanning activity, and malware propagation.
Network Enumeration
The process of systematically identifying and cataloging hosts, services, and resources on a target network during reconnaissance.
Nation-State Actor
A government-sponsored threat actor that conducts cyber operations to advance national interests including espionage and sabotage.
NDR
Network Detection and Response. A security solution that monitors network traffic in real time to detect threats, investigate incidents, and automate responses.
Network Behavior Analysis
Security technology that monitors network traffic patterns to detect anomalies indicative of threats, policy violations, or operational issues.
Network Isolation
The practice of separating critical systems from general network access to reduce the attack surface and contain potential breaches.
Network Deception
Security techniques that deploy decoy systems, services, and data to mislead attackers and detect intrusion attempts.
Null Byte Injection
An attack using null byte characters to truncate strings in web applications, bypassing file extension checks and other validations.
NoSQL Injection
An attack targeting NoSQL databases through injection of malicious queries, exploiting the query language of databases like MongoDB.
Neural Network Trojan
A backdoor embedded in a neural network model during training that activates when specific trigger patterns are present in the input.
NFV Security
Security considerations for Network Function Virtualization where network services run as software on commodity hardware.
Network Sandbox
An isolated network environment used to safely detonate and analyze suspicious files and URLs without risking production systems.
Network Access Broker
Cybercriminals who specialize in gaining unauthorized access to corporate networks and selling that access to other threat actors.
Network Worm
Self-replicating malware that spreads across networks by exploiting vulnerabilities in network services without requiring user interaction.
NIST 800-53
A catalog of security and privacy controls for federal information systems, providing comprehensive security requirements.
NIST 800-171
Security requirements for protecting controlled unclassified information in nonfederal systems and organizations.
NIDS
Network-based Intrusion Detection System. An IDS deployed at strategic network points to monitor all traffic flowing through that segment.
Network Access Control
Security technology that enforces endpoint compliance policies before allowing devices to connect to the network.
Network Quarantine
The automatic isolation of non-compliant or infected devices into a restricted network segment until remediated.
Network Triage
The rapid assessment of network security incidents to determine scope, severity, and priority of response actions.
Network Packet Broker
A device that aggregates, filters, and distributes network traffic from TAPs and SPAN ports to monitoring tools.
NetBIOS Enumeration
The process of gathering information from Windows networks using NetBIOS name resolution and session queries.
Network Implant
A covert device or software placed on a target network during a penetration test to provide persistent access.
Neural Backdoor
A hidden vulnerability implanted in a neural network during training that causes targeted misclassification when a specific trigger is present.
Network Monitoring Tool
Software that continuously watches network traffic and device status to detect performance issues and security anomalies.
Network Baseline
A documented snapshot of normal network behavior including traffic patterns and performance metrics used for anomaly detection.
Natural Language Attack
Using carefully crafted text to manipulate AI systems that process natural language, including prompt injection and jailbreaking.
Network Visibility
The ability to see and understand all traffic, devices, and activities across a network for security monitoring.