Glossary

This glossary contains definitions of many of the cybersecurity terms used in this book, described as plainly as possible for the business reader or non-cybersecurity professional. This glossary assumes a general knowledge of information technology (IT) as it endeavors to explain cybersecurity concepts for the reader who is seeking to understand how cybersecurity fits into the overall IT picture.

In this glossary, terms that are used in definitions and are defined elsewhere in the glossary are italicized.

A

Access Management - Management of permissions related to computer and network resources, and applied to people, accounts, or machines. Access management oversees who can access what in an IT environment.

Advanced Persistent Threat ...

Get Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.