Terminology Flashcards
(121 cards)
Access Control
The process of granting or denying specific requests for or attempts to connect to a corporate network.
The process of granting or denying specific requests for or attempts to connect to a corporate network.
Access Control
Access Control List (ACL)
Applies rules to switch ports or (Internet Protocol) IP addresses available to a host or switch. The rules determine whether packets can flow through those ports or IPs.
Set of rules that apply to switch ports or (Internet Protocol) IP addresses available to a host or switch. The rules determine whether packets can flow through those ports or IPs.
Access Control List (ACL)
Access Layer
The concentration point at which clients access the network. Access layer devices control traffic by localizing service requests to the access medial.
The concentration point at which clients access the network. These devices control traffic by localizing service requests to the access medial.
Access Layer
Accounting
The final piece in the AAA framework is accounting, which monitors the resources a user consumes during network access.
The final piece in the AAA framework, which monitors the resources a user consumes during network access.
Accounting
Agent
A piece of software that functions as an agent for a user or another program, working autonomously and continuously in a particular environment.
A piece of software that functions as an agent for a user or another program, working autonomously and continuously in a particular environment.
Agent
Antivirus
A program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents. Sometimes by removing or neutralizing the malicious code.
A program that monitors a computer or network to detect or identify major types of malicious code and to prevent or contain malware incidents. Sometimes by removing or neutralizing the malicious code.
Antivirus
Attack Surface
The set of ways in which an adversary can enter a system and potentially cause damage.
The set of ways in which an adversary can enter a system and potentially cause damage.
Attack Surface
Authentication
The process of verifying the identity or other attributes of an entity (user, process, or device).
The process of verifying the identity or other attributes of an entity (user, process, or device).
Authentication
Authoization
A process of determining, by evaluating applicable access control information, whether a subject is allowed to have the specified types of access to a particular resource.
A process of determining, by evaluating applicable access control information, whether a subject is allowed to have the specified types of access to a particular resource.
Authorization
Compliance
A program that establishes risk-based controls to protect the integrity, confidentiality, and accessibility of information stored, processed, or transferred.
A program that establishes risk-based controls to protect the integrity, confidentiality, and accessibility of information stored, processed, or transferred.
Compliance
Data Breach
The unauthorized moment or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information.
The unauthorized moment or disclosure of sensitive information to a party, usually outside the organization, that is not authorized to have or see the information.
Data Breach
Data Loss Prevention
Procedures and mechanism to stop sensitive data from leaving a security boundary.
Procedures and mechanism to stop sensitive data from leaving a security boundary.
Data Loss Prevention