O'Reilly logo

Security+ Training Guide by Todd King

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix B. Glossary

A
accounting

Tracking users' access to resources primarily for billing purposes.

active detection

Involves some action taken by the intrusion detection system in response to a suspicious activity or an intrusion (in essence, it is reactive detection).

algorithm

A set of sequenced steps that are repeatable each time. In encryption, the algorithm is used to define how the encryption is applied to the data.

anomaly-based IDS

Looks for traffic that is considered abnormal. To single out abnormal traffic patterns, the system has to be taught (or learn) what is considered normal in the first place.

asset

A company resource that has value.

asymmetric algorithms

A pair of key values, one public and the other private, used to encrypt and ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required