A B C D E F G H I J K L M N O P Q R S T U V W X Z
*

N

National Exercise Program

A program that uses exercises and other readiness activities that target strategic decision-making, operational and technical capabilities, strategic engagement and communications. Through these exercises the program can help broaden your understanding of the roles and responsibilities of key government entities and private sector organisations when responding to a cyber security incident.

Need-to-know

The principle of restricting an individual’s access to only the data they require to fulfil the duties of their role.

Network

Two or more computer systems linked together

Network access control

Security policies used to control access to a network and actions on a network. This can include authentication checks and authorisation controls.

Network device

IT equipment designed to facilitate the communication of data. For example, routers, switches and wireless access points.

Network infrastructure

The infrastructure used to carry data between workstations and servers or other network devices.

Network management traffic

Network traffic generated by system administrators over a network in order to control workstations and servers. This includes standard management protocols and other network traffic that contains data relating to the management of the network.

Network segmentation

Partitioning a network into smaller networks; compare with network segregation.

Network segregation

Developing and enforcing a rule set for controlling the communications between specific hosts and services; compare with network segmentation.

Networking

The linking of computers to allow them to operate interactively.

NIDS

Network-based Intrusion Detection System

NIPS

Network-based Intrusion Prevention System

NIST

National Institute of Standards and Technology

Non-disclosure agreement (NDA)

A contract by which one or more parties agree not to disclose confidential information that they have shared with each other as a necessary part of doing business together.

Non-interactive authentication

Authentication between systems or services that does not involve the interaction of a person.

Non-repudiation

Providing proof that a user performed an action, and in doing so preventing a user from denying that they did so.

Non-volatile flash memory media

A specific type of electrically erasable programmable read-only memory.

Non-volatile media

A type of media which retains its data when power is removed.