Appendix B. Glossary
Tracking users' access to resources primarily for billing purposes.
- active detection
Involves some action taken by the intrusion detection system in response to a suspicious activity or an intrusion (in essence, it is reactive detection).
A set of sequenced steps that are repeatable each time. In encryption, the algorithm is used to define how the encryption is applied to the data.
- anomaly-based IDS
Looks for traffic that is considered abnormal. To single out abnormal traffic patterns, the system has to be taught (or learn) what is considered normal in the first place.
A company resource that has value.
- asymmetric algorithms
A pair of key values, one public and the other private, used to encrypt and ...