There are currently 11 terms in this directory beginning with the letter N.
Natural Language Generation (NLG)
The process of generating human-like text or language by computers. NLG systems analyze data and generate coherent and contextually appropriate text, enabling applications such as automated report generation or chatbot responses.
Natural Language Processing (NLP)
The area of AI concerned with enabling computers to understand, interpret, and generate human language. It involves tasks such as language translation, sentiment analysis, and speech recognition.
Natural Language Understanding (NLU)
The ability of AI systems to comprehend and extract meaning from human language, including syntactic and semantic analysis.
Network Access Control (NAC)
Network access control (NAC) is a security approach that enforces policies to control and manage devices attempting to connect to a network. NAC solutions authenticate and evaluate the compliance of devices, such as laptops, smartphones, or IoT devices, before granting them access to the network. NAC systems enforce security policies, ensure devices are free from malware or vulnerabilities, and provide visibility and control over network access. NAC helps protect against unauthorised access, enforce security standards, and maintain the integrity of network resources.
Network Architecture
Network architecture refers to the design and structure of a computer network, including its components, protocols, and connectivity. It defines the layout, organisation, and interconnections of devices, servers, routers, switches, and other network elements. Network architecture plays a crucial role in establishing the security, scalability, performance, and reliability of a network. It includes considerations such as network segmentation, secure protocols, access controls, intrusion detection systems, and disaster recovery mechanisms.
Network Security
Network security encompasses measures and practices designed to protect the integrity, confidentiality, and availability of data and resources within a computer network. It involves implementing various security controls, such as firewalls, intrusion detection/prevention systems, access controls, encryption, and network monitoring. Network security aims to prevent unauthorised access, detect and respond to security incidents, protect against network-based attacks, and ensure the secure transmission and storage of data across networks.
Network Segmentation
Network segmentation is the practice of dividing a computer network into smaller, isolated subnetworks to enhance security, control access, and contain the impact of security incidents. By segmenting a network, organisations can separate critical systems or sensitive data from the rest of the network, restrict communication between segments, and apply tailored security controls to each segment. Network segmentation helps limit lateral movement by attackers, reduces the attack surface, and prevents the spread of threats within the network.
Network Segregation
Network segregation refers to the isolation of different network segments or zones to enhance security and prevent unauthorised access or lateral movement. Segregation involves placing network resources, such as servers, devices, or services, into separate logical or physical segments, often connected through firewalls or routers. Each segment has its own security controls, access policies, and trust levels. Network segregation helps contain security incidents, limit the impact of breaches, and control communication between different parts of the network.
Neural Network
A computational model inspired by the human brain's structure and function, consisting of interconnected artificial neurons that process and transmit information.
Neural Networks
Computational models inspired by the structure and function of the human brain, consisting of interconnected nodes (neurons) organized in layers. They process information and learn by adjusting the strengths of connections (weights) between neurons.
Non-Repudiation
Non-repudiation is a security concept that ensures that the parties involved in a transaction or communication cannot deny their involvement or the authenticity of the exchanged information. It provides proof of the integrity and origin of data, preventing the sender or recipient from denying their actions or the validity of a digital transaction. Non-repudiation mechanisms, such as digital signatures or transaction logs, provide strong evidence of the authenticity, integrity, and accountability of electronic communications or transactions.