Glossary
- access
The ability to read, write, modify, or use any of a company's system resources.
- access control
Prevention of unauthorized use of any of a company's system resources either externally (by an intruder) or internally (by an employee who should not have access).
- accountability
Ensuring that activities on supported systems can be traced to an individual who is held responsible for the integrity of the data.
- assurance
A level of confidence that the information system architecture mediates and enforces the organization's security policy.
- audit trail
A documented record of events allowing an auditor (or security administrator) to reconstruct past system activities.
- authenticate
To verify the identity of a user, device, or any other system ...
Get Executive Guide to Information Security, The: Threats, Challenges, and Solutions now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.