Appendix B. Glossary


Tracking users' access to resources primarily for billing purposes.

active detection

Involves some action taken by the intrusion detection system in response to a suspicious activity or an intrusion (in essence, it is reactive detection).


A set of sequenced steps that are repeatable each time. In encryption, the algorithm is used to define how the encryption is applied to the data.

anomaly-based IDS

Looks for traffic that is considered abnormal. To single out abnormal traffic patterns, the system has to be taught (or learn) what is considered normal in the first place.


A company resource that has value.

asymmetric algorithms

A pair of key values, one public and the other private, used to encrypt and ...

Get Security+ Training Guide now with the O’Reilly learning platform.

O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.