1/9
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Zero Trust Security
A security approach that treats every user, device, and application as untrusted, requiring verification for all access.
Authentication Process
The process that verifies the identity of a user trying to access a resource, often requiring a username and password, and may involve additional factors.
Adaptive Identity
A characteristic of authentication policies that considers the context of who is trying to access the network, including their history and location.
VPN (Virtual Private Network)
A technology that creates a secure connection over the internet, allowing users to access the network as if they were physically present.
SASE (Secure Access Service Edge)
A next-generation security framework that integrates network and security services into a single cloud service.
Limited Rights and Permissions
A security best practice that ensures users only have access to the data they need for their job role, minimizing unnecessary risks.
Malware
Malicious software that can infect devices and compromise systems, especially dangerous if a user has administrative access.
Policy Based Authentication
An authentication strategy that adapts the authentication requirements based on the user's profile and context, such as location and behavior.
Quality of Service (QoS)
A networking technology that manages data traffic to ensure a consistent level of performance.
Firewall as a Service
A cloud-based service that provides firewall protection for applications, managing security features without requiring on-premises hardware.