Categories

Network Security

Browse Network Security terms for cybersecurity professionals.

Languages

MTA Strict Transport

An email security policy (MTA-STS) that enforces strict encrypted transport (typically via TLS) between Mail Transfer Agents, reducing risk of interception and downgrade attacks during email delivery.

View term

VPN แยกอุโมงค์

A VPN configuration that allows some traffic to be routed through the secure VPN tunnel while other traffic accesses the Internet directly, as described in NIST SP 800-77 and IETF RFC 4026.

View term

กรอบความลับล่วงหน้า

A cryptographic protocol property ensuring that compromise of long-term keys does not compromise past session keys, as required in TLS 1.2+, NIST SP 800-56A, and IETF RFC 8446.

View term

กลยุทธ์การป้องกันแบบเลเยอร์

An approach that uses multiple, overlapping security controls at different layers (network, application, endpoint) to protect assets.

View term

การ Pivoting ข้อมูลข่าวกรองภัยคุกคาม

The analytic process of using one indicator (such as an IP, domain, or hash) as a starting point to discover related threat infrastructure, actors, or campaigns, facilitating deeper investigation.

View term

การกรองทราฟฟิกขาออก

The process of monitoring and controlling outgoing network traffic to block unauthorized, malicious, or policy-violating data transfers, typically implemented at the firewall or gateway.

View term

การกรองเวกเตอร์การเข้าถึง

A network defense technique that restricts or monitors traffic based on access vectors such as protocol, port, and direction, to minimize attack surface. See NIST SP 800-41r1.

View term

การกักกันแบบแยกโฮสต์

A network defense strategy to restrict or cut off network access for a compromised or suspicious host to prevent lateral movement and further infection. Referenced in NIST SP 800-61r2 and CIS Controls v8.

View term

การกำหนด VLAN กักกัน

The process of isolating endpoints identified as compromised or non-compliant by assigning them to a dedicated VLAN with restricted network access for remediation or further investigation.

View term

การกำหนดรูปแบบแพ็กเก็ตแบบปรับได้

A dynamic network management technique that adjusts packet flows based on real-time bandwidth, latency, or application priority, optimizing performance and enforcing policy. See NIST SP 800-115 and IETF RFC 2637.

View term

การขนส่งแยกส่วนไมโครเซอร์วิส

A network architecture approach in which communications between microservices are isolated into distinct, secured segments to reduce lateral movement and enforce least-privilege access in distributed environments.

View term

การควบคุมการตอบสนองต่อเหตุการณ์

The process of isolating or restricting the impact of an active security incident to prevent further spread, as described in NIST SP 800-61 and ISO/IEC 27035.

View term

การควบคุมการปกป้องเขตแดน

Security mechanisms (e.g., firewalls, gateways) deployed at network perimeters to monitor and filter inbound and outbound traffic.

View term

การค้นพบสินค้าคงคลังทรัพย์สิน

The process of systematically identifying, cataloging, and updating all IT and OT assets within an organization's environment for risk management and compliance per NIST SP 800-53 CM-8, ISO/IEC 27002, and CIS Control 1.

View term

การจัดการตอบสนองแบบปรับตัว

The automated coordination and execution of security responses that dynamically adjust based on incident severity and context, as described in NIST SP 800-61 and MITRE ATT&CK.

View term

การจำลองเส้นทางโจมตี

The systematic mapping and simulation of possible routes an adversary might take to compromise assets, used to assess risk and prioritize defenses. Documented in MITRE ATT&CK, NIST SP 800-160, and ENISA guides.

View term

การตรวจจับ DNS Tunneling

The process of monitoring and identifying covert data exfiltration or command-and-control channels hidden within DNS queries, as defined in NIST SP 800-83 and referenced in MITRE ATT&CK T1071.004.

View term

การตรวจจับช่องทางลับ

The identification and monitoring of unauthorized communication channels that exploit legitimate network protocols or resources to leak information. Referenced in NIST SP 800-53 (SC-7(19)), ISO/IEC 27002:2022, and CIS Controls v8.

View term

การตรวจจับภัยคุกคามแบบอินไลน์

Real-time inspection of network traffic by security appliances placed directly in the data path to identify and block threats.

View term

การตรวจจับเส้นทางด้านข้าง

The process of identifying unauthorized lateral movement within a network, typically by monitoring for abnormal access or connection patterns between hosts. Referenced in MITRE ATT&CK (T1075), NIST SP 800-61, and CIS Controls.

View term

การตรวจสอบการบูตอย่างปลอดภัย

A cryptographic process that ensures only trusted, signed firmware and software are loaded during system startup, preventing boot-level malware as described in NIST SP 800-147 and UEFI specifications.

View term

การตรวจสอบความสมบูรณ์ของเส้นทาง

A set of mechanisms that verify the authenticity and correctness of network routing information to prevent route hijacking, spoofing, or accidental misconfigurations. Referenced in IETF RFC 6811, 8205, and NIST SP 800-189.

View term

การตรวจสอบตะวันออก-ตะวันตก

Continuous inspection and analysis of lateral (intra-network) data flows within an organization's internal environment to detect, prevent, and respond to unauthorized movement or lateral attacks, as specified in NIST SP 800-207 and MITRE ATT&CK lateral movement techniques.

View term

การตรวจสอบทราฟฟิกที่เข้ารหัส

A process that enables the examination of encrypted network traffic to detect threats, enforce policies, and prevent data leakage, while maintaining privacy and regulatory compliance. Documented in NIST SP 800-115 and ISO/IEC 27002.

View term

การตรวจสอบที่อยู่ต้นทาง

The process of verifying that the source IP address of a packet is legitimate and not spoofed, typically enforced at network ingress. Defined in IETF BCP 38/84, NIST SP 800-189.

View term

การตรวจสอบสายโซ่ DNSSEC

The process of verifying each link in the DNSSEC signature chain from root to record to ensure domain name authenticity and integrity, as defined in IETF RFC 4033–4035 and NIST SP 800-81r2.

View term

การตรวจสอบโมดูลการเข้ารหัส

The formal process of testing and certifying that a cryptographic module meets defined security standards such as FIPS 140-3, NIST SP 800-140A, and ISO/IEC 19790, ensuring proper encryption, key management, and operational controls.

View term

การบล็อกทราฟฟิกที่เป็นอันตราย

Automated or manual actions taken to identify and prevent the flow of network traffic identified as malicious, including threats such as malware, phishing, and command-and-control traffic, as described in NIST SP 800-41 and CIS Control 9.

View term

การบังคับใช้ Security Header

The application of mandatory HTTP response headers (such as CSP, HSTS, X-Frame-Options) to protect web applications from attacks like XSS, clickjacking, and downgrade attacks.

View term

การบังคับใช้นโยบายการเข้าถึงเครือข่าย

The application of technical controls to regulate and restrict user, device, or service access to network resources, enforcing security policy compliance in accordance with NIST SP 800-53 AC-3 and ISO/IEC 27001 Annex A.9.

View term

การบังคับใช้นโยบายการแบ่งส่วน

The application and monitoring of access control policies that govern traffic between network segments to minimize unauthorized lateral movement, as specified in NIST SP 800-207 Zero Trust Architecture.

View term

การประกอบชิ้นส่วน IP ใหม่

The process of reconstructing fragmented IP packets into their original form for delivery, inspection, or security analysis, as described in IETF RFC 791, 815, and NIST SP 800-94.

View term

การประทับเวลาข้อมูลแพ็กเก็ต

The process of attaching accurate time information to network packets for logging, monitoring, forensic analysis, and latency measurement, as described in IETF RFC 7384 and NIST SP 800-137.

View term

การปรับใช้ IPsec แบบกำหนดเส้นทาง

An implementation of IPsec that leverages routing protocols to establish secure tunnels between network endpoints, supporting dynamic topology and policy-based traffic protection as outlined in IETF RFC 4301 and NIST SP 800-77.

View term

การปรับใช้เฮนนีเน็ตหลอกลวง

The setup of a network of decoy systems and services designed to lure, detect, and analyze attacker behavior.

View term

การป้องกันการเคลื่อนไหวด้านข้าง

Techniques and controls designed to detect and stop an adversary’s efforts to move laterally within a network after initial compromise.

View term

การป้องกันการเล่นซ้ำข้อความที่เข้ารหัส

A security mechanism that detects and blocks the reuse of captured ciphertext to prevent replay attacks in encrypted communications, as outlined in NIST SP 800-38A and IETF RFC 4303.

View term

การรวมเทเลเมตรีเครือข่าย

The collection, normalization, and consolidation of network telemetry data (such as flow records, logs, or metrics) from multiple sources for analysis and monitoring. Referenced in NIST SP 800-137 and IETF RFC 7011.

View term

การลดรัศมีผลกระทบ

Limiting the potential impact of a security breach by isolating assets and implementing controls that constrain the effects of an incident. See NIST SP 800-207 (Zero Trust) and CIS Controls.

View term

การล่าภัยคุกคามเครือข่าย

The proactive process of searching for hidden threats or adversaries within network traffic using behavioral analytics, threat intelligence, and hypothesis-driven investigation, as described in NIST SP 800-61 and MITRE ATT&CK.

View term

การวิเคราะห์การจับแพ็กเก็ต

The process of collecting and analyzing network packet data to detect threats, troubleshoot issues, and validate security policies. Referenced in NIST SP 800-115 and SANS Incident Handling.

View term

การวิเคราะห์โฟลว์เครือข่าย

The process of collecting, monitoring, and analyzing metadata about network traffic flows to detect anomalies and threats.

View term

การสร้างโปรไฟล์ทราฟฟิกผิดปกติ

The identification and categorization of network traffic patterns that deviate from established baselines to detect potential threats, as described in NIST SP 800-94 and MITRE ATT&CK.

View term

การสุ่มพอร์ตชั่วคราว

A technique where ephemeral (temporary) TCP/UDP ports are assigned randomly to reduce the risk of port prediction attacks, as defined in IETF RFC 6056 and NIST SP 800-77.

View term

การสแกนประเมินการถูกบุกรุก

A security scan that evaluates systems for indicators of compromise (IoCs), persistent threats, or policy violations, as defined in NIST SP 800-115 and MITRE ATT&CK.

View term

การส่งต่อแพ็กเก็ตอย่างปลอดภัย

The practice of transmitting data packets across networks in a manner that maintains confidentiality, integrity, and authenticity as defined by NIST SP 800-53 and IETF RFC 4301.

View term

การหลีกเลี่ยงการเลี่ยงการตรวจจับ

Techniques used by threat actors to evade or bypass security detection mechanisms such as IDS, IPS, or endpoint protection. Documented in MITRE ATT&CK (T1202, T1036) and NIST SP 800-61.

View term

การเข้ารหัสการส่งข้อมูลแบบสองฝ่าย

Encryption mechanism where both endpoints authenticate each other and establish encrypted transport, as defined in NIST SP 800-52 and RFC 5246 (TLS).

View term

การเข้ารหัสผ้าข่ายเครือข่าย

Encryption mechanisms applied to the entire data path within a network fabric, ensuring confidentiality and integrity of traffic between distributed nodes. Referenced in NIST SP 800-207 and IETF RFC 7387.

View term

การเข้ารหัสเซอร์วิสมิช

End-to-end encryption of communications between services within a service mesh architecture, typically using mutual TLS (mTLS), as recommended in NIST SP 800-204 and CNCF Service Mesh Whitepaper.

View term

การแจ้งเตือนการยกระดับสิทธิ์

The process of generating real-time alerts whenever a user or process attempts to gain higher-level access than authorized, often indicating a potential compromise, as outlined in NIST SP 800-53 AC-6 and MITRE ATT&CK T1068.

View term

การแบ่งปันตัวชี้วัดอัตโนมัติ

The automatic exchange of cyber threat indicators between organizations and trusted partners using standardized formats (e.g., STIX/TAXII) as specified in NIST SP 800-150 and DHS AIS.

View term

การแบ่งส่วนตามบทบาท

A network security practice dividing network resources or data access based on user or device roles, enforcing least privilege and segmentation boundaries per NIST SP 800-207 and ISO/IEC 27001.

View term

การแบ่งส่วนเครือข่ายเสมือน

The division of a physical network into multiple logical networks using virtualization techniques to isolate traffic and enforce policy.

View term

การแยกข้อมูลเพลน

The separation of the data forwarding path from management and control planes within network infrastructure to improve security and reduce risk of compromise. Defined in NIST SP 800-207 and IETF RFC 7426.

View term

การแยกเซสชันที่มีสิทธิพิเศษ

The separation and monitoring of administrative sessions from standard user sessions to prevent misuse of privileged access, as outlined in NIST SP 800-53 AC-6 and ISO/IEC 27002.

View term

การ์ดระดับอินเทอร์เฟซ

A security control that enforces policy, filtering, or access restrictions at a specific network interface, segmenting and protecting traffic based on interface context. See NIST SP 800-41r1.

View term

ขอบเขตที่กำหนดโดยซอฟต์แวร์

A cybersecurity framework that dynamically creates one-to-one network connections between users and resources using identity-based access and encrypted tunnels, making internal services invisible to unauthorized users.

View term

ความปลอดภัยจุดแลกเปลี่ยนอินเทอร์เน็ต

The collective security controls, policies, and operational measures implemented at an Internet Exchange Point (IXP) to protect member networks from unauthorized access, route leaks, and attacks, per ENISA IXP Security Guide.

View term

ความปลอดภัยชั้นขนส่ง

A cryptographic protocol designed to provide secure communication over a computer network, protecting data in transit via authentication, encryption, and integrity mechanisms. Defined in IETF RFC 5246/8446, NIST SP 800-52r2, ISO/IEC 27002.

View term

ความผิดปกติของพฤติกรรมเครือข่าย

An observed deviation from established patterns of normal network activity that may indicate the presence of malicious activity, policy violations, or security incidents.

View term

จุดตัดสินนโยบาย

A logical component in access control architectures (e.g., ABAC, RBAC) that evaluates access requests against policy rules and renders authorization decisions, per NIST SP 800-207 and XACML.

View term

ช่องคำสั่งที่ปลอดภัย

An encrypted, authenticated communication pathway used for transmitting privileged commands or control signals, as described in NIST SP 800-53 SC-8 and IETF RFC 4949.

View term

ช่องทางควบคุมคำสั่ง

A communications channel used by attackers or malware to issue instructions to compromised hosts, or by defenders for authorized remote administration, as described in NIST SP 800-61 and MITRE ATT&CK T1071.

View term

ต้นทางเส้นทาง BGP

The original source Autonomous System (AS) that advertises a specific IP prefix into the global BGP routing table, validated through RPKI and other mechanisms. Specified in IETF RFC 6811, 7115, and NIST SP 800-189.

View term

นโยบายกักกัน Endpoint

A formalized set of procedures and controls for isolating endpoints exhibiting signs of compromise or non-compliance from the production network, often enforced via NAC or endpoint security tools.

View term

นโยบายไมโครเซกเมนต์

A set of rules that define fine-grained network zones and enforce isolation between workloads to limit lateral movement.

View term

บรรทัดฐานการกำหนดค่าความปลอดภัย

A documented set of secure settings and parameters for systems or applications, serving as a reference point for compliance, hardening, and continuous monitoring. Described in NIST SP 800-128, CIS Controls v8, ISO/IEC 27002.

View term

บริการแยกเบราว์เซอร์

A security control that runs browser sessions in isolated, remote containers or sandboxes to protect endpoints from web-based threats, preventing direct execution of malicious code on the user’s device.

View term

ปฏิบัติการลวงไซเบอร์

Deliberate use of decoys, traps, and misinformation within an organization's environment to detect, divert, and analyze adversary behavior, enhancing detection and response capabilities.

View term

พร็อกซีตระหนักตัวตน

A security proxy that enforces access controls and authentication based on user or device identity before allowing access to internal resources, as specified in NIST SP 800-207 and Google BeyondCorp architecture.

View term

พร็อกซีสิ้นสุด TLS

A network device or service that decrypts incoming TLS traffic at the network edge, forwarding unencrypted traffic internally to simplify management, as described in NIST SP 800-52r2 and IETF RFC 9340.

View term

ระบบอัตโนมัติในการประสานงานความปลอดภัย

The integration and automation of security processes, tools, and workflows to accelerate detection, investigation, and response, as described in NIST SP 800-61 and CIS Control 18.

View term

ระบบเครือข่ายคอนเทนเนอร์ที่ปลอดภัย

The practice of applying security controls, segmentation, and encrypted communication to the networking layer between containers in cloud-native or virtualized environments, minimizing exposure to lateral movement and unauthorized access.

View term

รากฐานความเชื่อมั่นฮาร์ดแวร์

A cryptographic foundation embedded in hardware (e.g., TPM, HSM, or secure enclave) that provides immutable security anchors for system boot, identity, and cryptographic operations. Referenced in NIST SP 800-164 and ISO/IEC 11889.

View term

ศูนย์รวบรวมตัวชี้วัด

A centralized facility or platform that aggregates, correlates, and analyzes cybersecurity indicators (such as IOCs) from multiple sources to support threat detection, incident response, and situational awareness.

View term

สถาปัตยกรรม DNS ที่ทนทาน

A DNS infrastructure designed for high availability, redundancy, and resistance to attacks or failures, ensuring continued name resolution even under adverse conditions. Referenced in NIST SP 800-207 and ISO/IEC 27001.

View term

สถาปัตยกรรมความเชื่อถือศูนย์

A security model centered on the assumption that no user or device, inside or outside the network perimeter, is trusted by default and must be continuously authenticated and authorized.

View term

อุโมงค์ส่วนตัวเสมือน

A secure, encrypted connection established over a public or untrusted network, forming a logical link that protects data in transit between endpoints. Based on principles in NIST SP 800-77 and IETF VPN RFCs.

View term

เกตเวย์การเข้าถึงจากระยะไกล

A secured network device or service that brokers and controls remote user access to internal organizational resources, enforcing strong authentication and monitoring, as defined in NIST SP 800-77 and ISO/IEC 27033.

View term

เกตเวย์ขอบเขตที่ปลอดภัย

A security-hardened network device or configuration that manages and filters traffic entering or leaving the network perimeter, typically enforcing access controls, threat inspection, and routing. Referenced in NIST SP 800-41r1, IETF RFC 4271.

View term

เกตเวย์บริการ Honeypot

A dedicated network gateway or proxy that directs traffic to and from honeypot resources, isolating deceptive assets from production systems and facilitating monitoring and analysis of attacker behavior.

View term

เกตเวย์อีเมลที่ปลอดภัย

A dedicated security appliance or cloud service that monitors, filters, and blocks malicious email content (spam, phishing, malware) before it reaches the recipient's mailbox.

View term

เครือข่ายโอเวอร์เลย์ที่ปลอดภัย

A logically separated, secured network built on top of an existing network to provide enhanced security controls and isolation, as per NIST SP 800-207 and RFC 6819.

View term

เครื่องยนต์จัดหมวดหมู่ทราฟฟิก

A system or module that automatically identifies, categorizes, and labels network traffic based on protocols, applications, or security policies, enabling granular network monitoring and enforcement. Referenced in NIST SP 800-137 and CIS Control 13.

View term

เซิร์ฟเวอร์นโยบาย NAC

A core component of network access control (NAC) systems, responsible for evaluating endpoint posture, enforcing security policies, and granting or denying network access based on compliance.

View term

เซ็นเซอร์รวบรวมโฟลว์

A network device or software agent that passively gathers, aggregates, and forwards network flow records (such as NetFlow, IPFIX, or sFlow) for traffic analysis, anomaly detection, or forensic investigation. See NIST SP 800-137 and IETF RFC 3954.

View term

เพลย์บุ๊คค้นหาอันตราย

A documented, repeatable procedure outlining hypothesis-driven threat hunting steps, data sources, detection logic, and response actions for proactive threat discovery. Referenced in SANS Threat Hunting Framework, NIST SP 800-61, and MITRE ATT&CK.

View term

แทปผ้าทัศนวิสัย

A hardware or virtual device that creates a copy of network traffic for out-of-band monitoring, analytics, and security inspection, supporting scalable visibility across distributed network environments. Referenced in NIST SP 800-137 and IETF RFC 8326.

View term

โซนอินเทอร์เฟซที่ไม่ไว้วางใจ

A designated network segment where interfaces connect to untrusted networks or devices, typically requiring strict security controls and monitoring per NIST SP 800-41 and CIS Control 13.

View term

ไดนามิกพอร์ตน็อกกิ้ง

A security technique requiring a dynamic, pre-defined sequence of connection attempts to specific ports before granting access to a protected network service, as described in IETF RFC 6191 and SANS controls.

View term
Termify Get Termify on the App Store OPEN
AI Free AI Search Source-backed aviation answers