Glossary

A

acceptable use

An organization’s policy that provides specific detail about what users may do with their network access, including email and instant messaging usage for personal purposes, limitations on access times, and the storage space available to each user.

access control list (ACL)

In its broadest sense, an access control list is the underlying data associated with a network resource that defines the access permissions. The most common privileges include the ability to read, write to, delete, and execute a file.

accounting

The tracking of users’ access to resources primarily for auditing purposes.

ActiveX

A Microsoft-developed a precompiled application technology that can be embedded in a web page in the same way as Java ...

Get CompTIA Security+ Exam Cram, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.