#
802.1X: It is the IEEE standard for encapsulating EAP or Extensible Authentication Protocol traffic over the 802 networks
802.1X with EAP-TLS: Offers arguably the best security available, assuming proper and secure handling of the PKI aspects of it
A
Access Control Entries: The individual access permissions per object that make up the ACL
Access Control List (ACL): It is a way of defining permissions or authorizations for objects
Accounting: Keeping records of what resources and services your users access or what they did when they were using your systems
Activation threshold: Triggers a pre-configured action when it is reached and will typically block the identified attack traffic for a specific amount of time
Advanced Encryption Standard (AES):The first and only public cipher that's approved for use with top secret information by the United States National Security Agency
Adware: Software that displays advertisements and collects data
Analyzing logs: The practice of collecting logs from different network and sometimes client devices on your network, then performing an automated analysis on them
Antivirus software: It monitors and analyze things like new files being created or being modified on the system in order to watch for any behavior that matches a known malware signature
Application policies:Defines boundaries of what applications are permitted or not, but they also help educate folks on how to use software more securely
Asymmetric encryption: Systems where different keys are used to encrypt and decrypt
Attack: An actual attempt at causing harm to a system
Attack surface: It's the sum of all the different attack vectors in a given system
Attack vector: Method or mechanism by which an attacker or malware gains access to a network or system