A
acceptable use policy

Agreed-upon principles set forth by a company to govern how the employees of that company may use resources such as computers and Internet access.

access attack

An attack aimed at gaining access to resources.

access control

The means of giving or restricting user access to network resources. Access control is usually accomplished through the use of an access control list (ACL).

access control list (ACL)

A table or data file that specifies whether a user or group has access to a specific resource on a computer or network.

access point (AP)

The point at which access to a network is accomplished. This term is often used in relation to a wireless access point (WAP).

accountability

Being responsible for an item. ...

Get CompTIA Security+™: Study Guide, Fourth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.