Archives: Tooltips

  • SNSR

    SNSR A SmokeNet Switch/Router (SNSR) is a telco grade SmokeNet device that provides the core functionality to create and manage SmokeNet networks.

  • PUMAS

    PUMAS Processing Units for Multi Agent Systems (PUMAS) is a distributed computing framework for Fog computing, developing robust AI, and Defensive Cybersecurity.

  • ZTPN

    Zero Trust Private Network A Zero Trust Private Network (ZTPN) is a tunneling system that isolates the network tunnels from the underlying protocols of the base network. It also uses encryption that is not based on keys or math. Keys can be stolen and encryption based on math at best can only be theoretically secure

  • ZTA

    Zero Trust Architecture Zero Trust Architecture (ZTA) is a cybersecurity architecture that relies on removing trust in all digital ecosystem entities. This includes humans, networks and devices. The base assumption is things are not secure.

  • Phishing

    Phishing Phishing is a social engineering attack in which attackers, often posing as trusted parties, convince unwitting targets to give them valuable information. One type is Spear Phishing, which uses emails personalized and tailored to the recipient, building a relationship to obtain more critical pieces of information.

  • Moving Target Defense

    Moving Target Defense Moving Target Defense (MTD) is a defensive mechanism that, when applied to networks, consists of repeatedly changing one or more characteristics of the network, such as logical ports or physical networks. Randomizing these changes makes it unpredictable, ensuring attackers cannot latch onto a target.

  • Edge

    Edge The Edge, or Network Edge, is a part of the network that is at or close to the area where users or devices send or receive data.

  • Outlier

    Outlier An outlier is an extremely rare individual who is a high achiever who has been given opportunities and has taken advantage of them in order to succeed. They typically have a unique experiential background starting at childhood.

  • Fog Computing

    Fog Computing Fog Computing is a concept of a decentralized, distributed computing system that uses edge devices for storage, computing power, and other functions. Introspective Networks’ PUMAS product is an example of a Fog Computing implementation.

  • SmokeNet

    SmokeNet SmokeNet not only protects your data with the strongest encryption available, it actually hides it. Moving Target Defense techniques combined with Streaming Encryption using a Vernam Cipher create a new level of defense for your network and data in motion. By doing this, SmokeNet creates a virtual smokescreen in your network removing all network […]