ACL
Access Control List- a list that controls who/what can access certain resources
NAC
Network Access Control- ensure only AUTHORIZED devices connect
IDS
Intrusion Detection System- detects suspicious activity (but doesn’t stop it)
IPS
Intrusion Prevention System- detects AND block attacks
RDP
Remote Desktop Protocol- visually control a remote PC
SSH
Secure Shell- encrypted remote command-line access
SFTP
SSH File Transfer Protocol- secure file transfer over SSH
SCP
Secure Copy Protocol- copies files via SSH
FTPS
FTP over TLS/SSL- encrypted FTP
ESP
Encapsulating Security Payload- encrypts + authenticates IP packets
AH
Authentication Header- authenticates IP packets only, no encryption
SPD
Security Policy Database- IPsec rules for traffic
SAD
Security Association Database- stores active IPsec connections
PFS
Perfect Forward Secrecy- new session keys for each connection
VLAN
Virtual LAN- segments networks logically
LAN
Local Area Network- a computer network that interconnects computers within a limited area
WWAN
Wireless Wide Area Network- cellular/mobile network
PAN
Personal Area Network- very small network e.g., Bluetooth
SIP
Session Initiation Protocol- sets up VoIP calls
RTP
Real-Time Protocol- transmits audio/video stream
SRTP
Secure RTP- encrypted version of RTP
SHTTP
Secure HTTP- early secure web protocol (rarely used today)