TAILIEUCHUNG - SANS GIAC Information Security KickStart Glossary of Terms

Access Control: Mechanism(s) used to restrict access to an object. ACL Access Control List. A list of resources and the permissions or authorizations allowed. Active Code/Active Content: Generic term for software delivered via the world Wide Web that executes directly on the user's computer. Alert: A formatted message describing a circumstance relevant to network security. Alerts are often derived from critical audit events. | SANS GIAC Information Security KickStart Glossary of Terms Term Definition Access Control Mechanism s used to restrict access to an object. ACL Access Control List. A list of resources and the permissions or authorizations allowed. Active Code Active Content Generic term for software delivered via the world Wide Web that executes directly on the user s computer. Alert A formatted message describing a circumstance relevant to network security. Alerts are often derived from critical audit events. Analog Communications Method of communications that involves continuous modification of energy waves. ASCII American Standard Code for Information Interchange. The system of representing characters as fixed patterns of data bits. Assurance A measure of confidence that the security features and architecture of a system or service accurately mediate and enforce the security policy. Asymmetric Encryption The process of encoding information by using both a distributed public key and a secret private key. See Public Key Cryptography. Attack An attempt to bypass security controls on a computer. The attack may alter release or deny data. Whether an attack will succeed depends on the vulnerability of the computer system and the effectiveness of existing countermeasures. Audit The independent examination of records and activities to ensure compliance with established controls policy and operational procedures and to recommend any indicated changes in controls policy or procedures. Audit Trail In computer security systems a chronological record of system resource usage. This includes user login file access other various activities and whether any actual or attempted security violations occurred legitimate and unauthorized. Authenticate To establish the validity of a claimed user or object. Authentication To positively verify the identity of a user device or other entity in a computer system often as a prerequisite to allowing access to resources in a system. Authorization Granting a .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.