InfoSec Pro SERIES
acceptable use of computers   Defines what activities are acceptable on computer systems owned by the organization.
access attack   An attempt to gain information that the intruder is not authorized to see.
access control   A mechanism used to restrict access to files, folders, or systems based on the identification and authentication of the user.
accountability   The process administration uses to account for an individual’s activities and to assign responsibility for actions that have taken place on an information system.
address resolution protocol (ARP) spoofing   A tactic used to forge the MAC address of a system to get packets directed to the attacking computer.
administrative practices   Practices that fall ...

Get Computer Forensics InfoSec Pro Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.