Secure equivalent of Telnet
Secure shell (SSH) → encrypted remote access protocol that replaces Telnet by protecting credentials and session data from interception while allowing secure command-line management of systems.
tcp/22
Secure equivalent of HTTP
Hypertext transfer protocol secure (HTTPS) → secure version of HTTP that uses transport layer security encryption to protect web traffic from eavesdropping, tampering, and man-in-the-middle attacks.
tcp/443
Secure equivalent of IMAP
Internet message access protocol secure (IMAPS) → encrypted version of IMAP that protects email messages and credentials while mail is accessed from a server. Allows you to sync email across different devices securely
tcp/993
Secure equivalent of FTP
Secure file transfer protocol (SFTP) → secure file transfer protocol that runs over secure shell to encrypt authentication and file data, replacing insecure FTP.
tcp/22
Active Directory
Active Directory → centralized directory service that stores information about network resources such as users, computers, groups, printers, and file shares, and manages authentication and access control, commonly used by help desk teams.
Group Policy
Group Policy → centralized management feature used with Active Directory that enforces security settings, configurations, and restrictions across users and computers in a domain.
SELinux
Security-enhanced Linux (SELinux) → Linux security module that enforces mandatory access control policies to restrict what processes and users can do, even if they are compromised.
MAC in Linux
Mandatory access control (MAC) in Linux → access control model where permissions are enforced by the system admin using security policies rather than user ownership, providing stronger protection against privilege misuse.
DAC in Linux
Discretionary access control (DAC) in Linux → access control model where resource owners control permissions, allowing flexibility but increasing risk if users misconfigure access.
This is the default in Linux
Mail Gateway
Mail gateway → security system that evaluates inbound and outbound email at the network edge or in the cloud, blocking malicious messages before they reach user inboxes.
DNS Records
Domain name system records → configuration entries that define how domain-related services such as email, websites, and authentication behave on the internet.
TXT Record
Text record (TXT record) → domain name system record used to store arbitrary text, commonly used to support email authentication and domain verification.
SPF Record
Sender policy framework (SPF) record → domain name system record that specifies which mail servers are authorized to send email on behalf of a domain, helping prevent spoofing.
DKIM Record
Domain keys identified mail (DKIM) record → email authentication method that uses digital signatures to verify message integrity and confirm the sending domain has not been altered.
DMARC Record
Domain-based message authentication, reporting, and conformance (DMARC) record → policy that ties sender policy framework and domain keys identified mail together to tell receiving servers how to handle unauthenticated email and provide reporting.