PKI (Public Key Infrastructure)

PKI — Pub­lic Key Infrastructure PKI — Public Key Infrastructure Pub­lic key infra­struc­ture (PKI) refers to a range of tech­nolo­gies for authen­ti­cat­ing users and devices in order to secure the dig­i­tal trans­fer of infor­ma­tion for a range of net­work...

OpenVPN

Open­VPN OpenVPN Open­VPN is a vir­tu­al pri­vate net­work (VPN) pro­to­col and soft­ware for both client and serv­er applications. It imple­ments tech­niques to cre­ate secure point-to-point or site-to-site con­nec­tions in rout­ed or bridged...

IPsec

IPsec IPsec IPsec (IP for “Inter­net Pro­to­col” and sec for “secure”) is a group of pro­to­cols to ensure the integri­ty, con­fi­den­tial­i­ty and authen­ti­ca­tion of data com­mu­ni­ca­tions over an IP network. IPsec is com­mon­ly used as a base for VPNs (Vir­tu­al...

TACACS +

TACACS+ — Ter­mi­nal Access Con­troller Access-Con­trol Sys­tem Plus TACACS+ — Terminal Access Controller Access-Control System Plus Ter­mi­nal Access Con­troller Access-Con­trol Sys­tem Plus (TACACS+) is a pro­to­col devel­oped by Cis­co to...

IEC 62351

IEC 62351 IEC 62351 IEC 62351 is a stan­dard devel­oped to han­dle the secu­ri­ty of TC 57 series of pro­to­cols includ­ing IEC 60870–5 series, IEC 60870–6 series, IEC 61850 series, IEC 61970 series & IEC...