Glossary

A B C D E G H I L M N O P R S T U V W

Access Control List

An Access Control List (ACL) is a set of rules that decide who can use a network resource and what they are allowed to...

Application firewall

Application firewall is a security tool that protects specific apps—like a website, mobile backend, or API—by inspecting the actual content of the traffic, not...

Asymmetric Encryption

Asymmetric Encryption is a way to protect data using two keys that are mathematically linked, a public key to encrypt and a private key...

Backdoor

A backdoor is a hidden way into a computer, network, or device that bypasses normal security. Hackers sometimes install backdoors using malware, allowing them...

Beacon Frame

Beacon frame is a Wi-Fi (802.11) management message that an access point (AP) sends regularly to announce the network. It carries the SSID (network...

Bluejacking

Bluejacking is the act of sending unsolicited messages to nearby Bluetooth devices. For example, someone sitting in a bus might use their phone to...

Communication protocol

Communication protocol is a set of rules that devices follow to send and receive data over a network. It defines how to start a...

Data Exfiltration

Data exfiltration is the unauthorized transfer of sensitive information from a computer or network to an outsider. Hackers often do this by installing malware...

Default Gateway

A default gateway is the device, usually a router, that connects your local network to the wider internet. When your computer doesn’t know where...

Demarcation point

Demarcation point is the spot where your ISP’s network ends and your home or office network begins. It marks who is responsible for what....