Front | Back |
Acceptable use policy (acro.)
|
AUP
|
Access control
|
All the policies and procedures a company uses to prevent improper access to systems by unauthorized insiders and outsiders.
282
|
Acceptable use policy
|
Defines acceptable uses of the firm's information resources and computing equipment, including desktop and laptop computers, wireless devices, telephones, and the Internet.
279
|
Antivirus software
|
Designed to check computer systems and drives for the presence of computer viruses.
285
|
Application proxy filtering
|
Stops data packets originating outside the organization, inspects them, and passes a proxy to the other side of the firewall.
284
|
Authentication
|
The ability to know that a person is who he or she claims to be.
282
|
Authorization management systems
|
Establish where and when a user is permitted to access certain parts of a Web site or a corporate database.
279
|
Authorization policies
|
Determine differing levels of access to information assets for different levels of users.
279
|
Biometric authentication
|
Compares a person's unique characteristics, such as the fingerprints, face, or retinal image, against a stored set profile of these characteristics to determine whether there are any differences between these characteristics and the stored profile.
283
|
Botnet
|
Infect other people's computers with bot malware that opens a back door through which an attacker can give instructions.
271
|
Business continuity planning
|
Focuses on how the company can restore business opreations after a disaster strikes;
identifies critical business processes and determines action plans for handling mission-critical functions if systems go down.
280
|
Chief Security Officer (acro.)
|
CSO
|
Click fraud
|
When an individual or computer prgram fraudulently clicks on an online ad without any intention of learning more about the advertiser or making a purchase.
274
|
Chief Security Officer
|
Responsible for enforcing the firm's security policy.
279
|
Computer forensics
|
The scientific collection, examination, authentication, preservation, and analysis of data held on or retrieved from computer storage media in such a way that the information can be used as evidence in a court of law.
277
|