InfoSec Pro SERIES
acceptable use of computers Defines what activities are acceptable on computer systems owned by the organization.
access attack An attempt to gain information that the intruder is not authorized to see.
access control A mechanism used to restrict access to files, folders, or systems based on the identification and authentication of the user.
accountability The process administration uses to account for an individual’s activities and to assign responsibility for actions that have taken place on an information system.
address resolution protocol (ARP) spoofing A tactic used to forge the MAC address of a system to get packets directed to the attacking computer.
administrative practices Practices that fall ...