O'Reilly logo

Inside Network Security Assessment: Guarding Your IT Infrastructure by David Kim, Michael Gregg

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Key Terms

Acceptable Use Policy (AUP)

A policy that defines what employees, contractors, and third parties are authorized to do on the organization’s IT infrastructure and its assets. AUPs are common for access to IT resources, systems, applications, Internet access, email access, and so on.

Adware

A software program that automatically forces pop-up windows of Internet marketing messages to users’ browsers on their workstation devices. Adware is different from spyware in that adware does not examine a user’s individual browser usage and does not examine this information on a user’s browser.

Botnet

A term used to describe robot-controlled workstations that are part of a collection of other robot-controlled workstations.

Buffer overflow

In ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required