O'Reilly logo

Professional Penetration Testing by Thomas Wilhelm

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix B. Definitions
TerminologyDefinition
Access ControlA security service that prevents the unauthorized use of information system resources (Information Assurance Technical Framework [IATF], 2000).
Access Control ListMechanism implementing discretionary and/or mandatory access control between subjects and objects (IATF, 2000).
AccountabilityThe security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. This supports nonrepudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action (IATF, 2000).
Application-Level FirewallA firewall system in which service is provided by processes that maintain complete TCP connection state and sequencing; ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required