InfoSec Pro SERIES
GLOSSARY
acceptable use of computers   Defines what activities are acceptable on computer systems owned by the organization.
access attack   An attempt to gain information that the intruder is not authorized to see.
access control   A mechanism used to restrict access to files, folders, or systems based on the identification and authentication of the user.
accountability   The process administration uses to account for an individual’s activities and to assign responsibility for actions that have taken place on an information system.
address resolution protocol (ARP) spoofing   A tactic used to forge the MAC address of a system to get packets directed to the attacking computer.
administrative practices   Practices that fall ...

Get Computer Forensics InfoSec Pro Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.