Glossary

access

The ability to read, write, modify, or use any of a company's system resources.

access control

Prevention of unauthorized use of any of a company's system resources either externally (by an intruder) or internally (by an employee who should not have access).

accountability

Ensuring that activities on supported systems can be traced to an individual who is held responsible for the integrity of the data.

assurance

A level of confidence that the information system architecture mediates and enforces the organization's security policy.

audit trail

A documented record of events allowing an auditor (or security administrator) to reconstruct past system activities.

authenticate

To verify the identity of a user, device, or any other system ...

Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.