Device Hardening
The process of securing a system by reducing its surface of vulnerability (e.g., patching, disabling unneeded services).
Disable Unused Ports/Services
A hardening technique where non-essential logical ports (e.g., Telnet, HTTP) and physical switch ports are shut down to prevent unauthorized access.
Change Default Passwords
The most basic hardening step; prevents attackers from using factory-set credentials found in online manuals.
Network Access Control (NAC)
A set of solutions that inspects a device’s ‘health’ (antivirus status, patches) before allowing it onto the network.
Port Security
A switch feature that limits the number of MAC addresses allowed on a single port; can disable the port if an unauthorized device is plugged in.
802.1X
A port-based authentication protocol that requires a user to provide credentials (usually to a RADIUS server) before the switch port opens.
MAC Filtering
A security method that only allows specific, pre-approved MAC addresses to connect to a switch or wireless AP; easily spoofed.
Key Management
The practice of securely generating, storing, and rotating cryptographic keys (used for VPNs, TLS, and SSH).
Access Control List (ACL)
A set of rules on a router or firewall that permits or denies traffic based on IP address, protocol, or port number.
URL Filtering
A security feature that blocks access to specific websites based on their web address (URL) or domain name.
Content Filtering
A security feature that inspects the actual data inside a web page (keywords, categories) to block inappropriate or malicious material.
Trusted vs. Untrusted Zones
Trusted zones are internal networks you control (LAN); Untrusted zones are external networks you don’t control (Internet).
Screened Subnet (DMZ)
A semi-private zone located between the internal network and the internet; holds public-facing servers like Web, Mail, or DNS.