computer-security-glossary.org

Website:https://www.computer-security-glossary.org/
Upvotes received0
Downvotes received0
Karma:0 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (155)

1

0 Thumbs up   0 Thumbs down

zombie


google_ad_client="pub-8027288574377500";google_ad_slot="1043341745";google_ad_width=120;google_ad_height=600; Definition: A Zombie is a computer whose operating system and resource [..]
Source: computer-security-glossary.org

2

0 Thumbs up   0 Thumbs down

Access control


Definition: Access control means that a thorough specification has been made, based on information security policies, as to who has the right to gain physical and logical proximity to information reso [..]
Source: computer-security-glossary.org

3

0 Thumbs up   0 Thumbs down

Accountability


Definition: Accountability is an essential information security concept. The phrase means that every individual who works with an information system should have specific responsibilities for informati [..]
Source: computer-security-glossary.org

4

0 Thumbs up   0 Thumbs down

Assurance


Definition The word "assurance", within the context of information systems security, can be thought of as a set of organizational policies and procedures that addresses all of the tasks requ [..]
Source: computer-security-glossary.org

5

0 Thumbs up   0 Thumbs down

ATTACHMENTS


Definition: Attachments are digital files that typically arrive with email correspondence. Some are graphic-images, others are word processing documents, spreadsheet files or database reports. Receivi [..]
Source: computer-security-glossary.org

6

0 Thumbs up   0 Thumbs down

Attacks


Definition: Attacks against information infrastructure may be categorized into two mains groups. One method would be electronic or logical-based (i.e. viruses, Trojan horses, etc.). Another would be p [..]
Source: computer-security-glossary.org

7

0 Thumbs up   0 Thumbs down

audits


Definition: Audits, as they relate to information systems, refer to comparing actual practices with existing policies and procedures. It’s an examination of information security processes. The main pu [..]
Source: computer-security-glossary.org

8

0 Thumbs up   0 Thumbs down

Authentication


Definition: Authentication is an access control technique or combination of techniques that verify the identity of an individual who is attempting to gain admittance into an information system. Organi [..]
Source: computer-security-glossary.org

9

0 Thumbs up   0 Thumbs down

Authorization


Definition: Authorization is a concept that directly relates to who has the right or privilege to access the information infrastructure. Access rights are determined by an information security plan th [..]
Source: computer-security-glossary.org

10

0 Thumbs up   0 Thumbs down

availability


Definition: Availability is that component of information assurance that focuses upon providing immediate access to mission critical data when it is needed for decision making. It would, otherwise, ne [..]
Source: computer-security-glossary.org


To view all 155 definitions, please sign in.