Host-based firewalls: Protects individual hosts from being compromised when they're used in untrusted and potentially malicious environments
HTTPS: It is the secure version of HTTP, the Hypertext Transfer Protocol
Hubs: Devices that serve as a central location through which data travels through; a quick and dirty way of getting packets mirrored to your capture interface
Identification: The idea of describing an entity uniquely
Impact:The impact of an incident is also an important issue to consider
Implicit deny: A network security concept where anything not explicitly permitted or allowed should be denied
Injection attacks: A common security exploit that can occur in software development and runs rampant on the web, where an attacker injects malicious code
Integrity: Means keeping our data accurate and untampered with
Intermediary (subordinate) CA:It means that the entity that this certificate was issued to can now sign other certificates
Intrusion detection and intrusion protection systems (IDS/IPS): Operates by monitoring network traffic and analyzing it
IPsec (Internet Protocol security): A VPN protocol that was designed in conjunction with IPv6
IP source guard (IPSG):It can be enabled on enterprise switches along with DHCP snooping
Issuer Name: This field contains information about the authority that signed the certificate
J
K
Kerberos: A network authentication protocol that uses tickets to allow entities to prove their identity over potentially insecure channels to provide mutual authentication
Kerckhoff's principle:A principle that states that a cryptosystem, or a collection of algorithms for key generation and encryption and decryption operations that comprise a cryptographic service should remain secure, even if everything about the system is known except for the key
Key: A crucial component of a cipher, which introduces something unique into your cipher