Glossary
|
acceptable use of computers Defines what activities are acceptable on computer systems owned by the organization.
access attack The attempt to gain information the intruder is not authorized to see.
access control A mechanism used to restrict access to files, folders, or systems based on the identification and authentication of the user.
accountability The process an organization uses to account for an individual’s activities and to assign responsibility for actions that have taken place on an information system.
address resolution protocol (ARP) spoofing A tactic whereby the MAC address of a system is forged to get packets directed to the attacking computer.
administrative practices Practices that fall under the ...
Get Malware, Rootkits & Botnets A Beginner's Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.