The Secret Security Wiki

Categories
Categories

Network Architecture

Network architecture is the design of a communication network. It is a framework for the specification of a network’s physical components and their functional organization and configuration, its operational principles and procedures, and data formats.

Virtual Desktop

A virtual desktop is an operating system and accompanying applications that are hosted on a server and made accessible to an endpoint – typically a remote endpoint – as if it was running locally on the endpoint. Virtual desktops are typically accessed through client software installed directly on an endpoint, and whose job it is...

Learn more

Virtual Machine

A virtual machine (VM) is an operating system (OS) or application environment that is installed on specialized software called a virtual machine monitor (VMM) that emulates the underlying hardware (e.g. a PC, server, mobile device, etc.) or operating environment. The VMM enables running multiple virtual machines on the same hardware resources. Virtual machines are generally...

Learn more

Mobile Device Management

Mobile Device Management (MDM) is a category of technology solutions that helps organizations manage large numbers of diverse user devices connected to the corporate IT environment in a consistent, scalable and cost-effective way, giving users the flexibility to use the devices of their choice to get their work done. Using MDM, IT administrators can control,...

Learn more

Stateless Authentication

Token-based authentication enables users to obtain a token that allows them to access a service and/or fetch a specific resource without using their username and password to authenticate every request. Because the token can be a self-contained entity that conveys all the required information for authenticating the request, it is often referred to as stateless...

Learn more

Stateful Cloud

Stateful protocols are all about recording session activity. Stateful cloud platforms use cookies to validate through Session Based Authentication during which the server will create a session for the user following his or her login. The session ID is then stored on a cookie on the user’s browser. For the entire duration of the user’s...

Learn more

Stateless Cloud

What are Stateless Clouds? Transmissions via stateless protocols means that data is being transmitted without any information about the sender or receiver being retained by either. Thus, both are unaware of the “state” of the other. The upside of clouds using stateless protocols is that they allow administrators to use the cloud without revealing credential...

Learn more

Demilitarized Zone

A DMZ, short for demilitarized zone, is a network (physical or logical) used to connect hosts that provide an interface to an untrusted external network – usually the internet – while keeping the internal, private network – usually the corporate network – separated and isolated form the external network. As systems that are most vulnerable...

Learn more

Zero Trust

Zero Trust, Zero Trust Network, or Zero Trust Architecture refer to security concepts and threat model that no longer assumes that actors, systems or services operating from within the security perimeter should be automatically trusted, and instead must verify anything and everything trying to connect to its systems before granting access. The term was coined...

Learn more

Virtual Private Network

A virtual private network (VPN) is a secured communications channel implemented over shared, public networks – i.e. the internet – to connect remote users and machines to a private network – i.e. a company’s network. Privacy is achieved by authenticating the connecting parties and encrypting the communications channel to prevent eavesdropping on data traversing the...

Learn more