Category: InfoSec

Access Tier

An Access Tier is an identity-aware proxy and gateway that mediates access into a private network segment within ...

Bastion Host

Bastion Host is a special-purpose internet-accessible server that accepts SSH connections for the purpose of ...

Host computer

The computer that is being accessed remotely. It is also referred to as the "server" or "remote machine."

Hybrid Cloud Security

Hybrid Cloud Security refers to a mixed computing, storage, and services environment made up of on-premises ...

Idle Timeout

A security feature that automatically disconnects a remote desktop session after a period of inactivity to protect ...

Information Security

The practice of protecting information and information systems from unauthorized access, use, disclosure, ...

Infrastructure as a Service (IaaS)

Infrastructure as a Service (IaaS) represents a pivotal model in the realm of cloud computing. This service, often ...

Lateral Movement

The techniques that a cyberattacker uses after gaining initial access to move deeper into a network, mapping out ...

Man in the Middle (MitM) Attack

A type of cyber attack where the attacker secretly relays and possibly alters the communications between two ...

NIST SP 800-207 Zero Trust Architecture

The National Institute of Standards and Technology (NIST) architecture is a series of cybersecurity measures and ...

Platform as a Service (PaaS)

Platform as a service (PaaS) is a complete development and deployment environment in the cloud, with resources ...

Policy

A Policy is a set of authorization rules that specify which users can access a given service or application. ...