1
A trap decoy, usually a server, a file, or computer system ready to be attacked.
2
Encryption protocol that provides security during data transmission.
3
Message from an unknown sender, which have not been requested or are not desired by the user.
4
A local network that is located between the internal network of an organisation and an external network, usually on the Internet.
5
Intrusion Detention System.
6
Intrusion Prevention System.