Glossary N
Normalization

Normalization

Converting each log data field to a particular data representation and categorizing it consistently.See NIST SP 800-92 under Log Normalization for more information.See NIST SP ...

Read More

AAA(1)

Null

Dummy letter, letter symbol, or code group inserted into an encrypted message to delay or prevent its decryption or to complete encrypted groups for transmission ...

Read More

Network Access Control (NAC)

Network Access Control (NAC)

A feature provided by some firewalls that allows access based on a user’s credentials and the results of health checks performed on the telework client ...

Read More

Individuals

Network Address Translation (NAT)

A routing technology used by many firewalls to hide internal system addresses from an external network through use of an addressing schema.See NIST SP 800-41 ...

Read More

National Vulnerability Database

National Vulnerability Database

The U.S. government repository of standards-based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data informs the automation of vulnerability management, security measurement, ...

Read More

(NIST) Special Publication

(NIST) Special Publication

Special Publication – a designation for NIST documents, sometimes supporting FIPS.See  NIST SP 800-76-2 under SP for more information.

Read More

Near Field Communication

Near Field Communication

A form of contactless, close proximity, radio communications based on radio-frequency identification (RFID) technology. See NIST SP 800-101 Rev. 1 for more information. 

Read More

Network Address Translation

Network Address Translation

A mechanism for mapping addresses on one network to addresses on another network, typically private addresses to public addresses. See NIST SP 800-77 under Network Address Translation for ...

Read More

Network Discovery

Network Discovery

The process of discovering active and responding hosts on a network, identifying weaknesses, and learning how the network operates. See NIST SP 800-115 for more information. 

Read More

Network Intrusion Detection System

Network Intrusion Detection System

Software that performs packet sniffing and network traffic analysis to identify suspicious activity and record relevant information. See NIST SP 800-86 for detailed information. 

Read More

Network Layer

Network Layer

Layer of the TCP/IP protocol stack that is responsible for routing packets across networks. See the following for detailed information: NIST SP 800-113. NIST SP 1800-21B from NIST SP 800-113. 

Read More