A
acceptable use policy

Agreed-upon principles set forth by a company to govern how the employees of that company may use resources such as computers and Internet access.

access attack

An attack aimed at gaining access to resources.

access control

The means of giving or restricting user access to network resources. Access control is usually accomplished through the use of an access control list (ACL).

access control list (ACL)

A table or data file that specifies whether a user or group has access to a specific resource on a computer or network.

access point (AP)

The point at which access to a network is accomplished. This term is often used in relation to a wireless access point (WAP).

accountability

Being responsible for an item. ...

Get CompTIA Security+™: Study Guide, Fourth Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.