Glossary

802.1X

A networking protocol that requires each device to authenticate before any network access is granted

absolute mode

A manner of using the Unix chmod command in which a complete set of permissions is specified with a single octal string

access control list (ACL)

A list that specifies which users and groups can perform various actions with a given file, folder, or volume

access point

A wireless router; a device that lets multiple Wi-Fi devices connect to the Internet (or another network) wirelessly

account

A unique number or name associated with a certain user who has permission to access a computer or service

adware

Software that displays advertising, often by using pop-up windows

algorithm

A mathematical formula used to encrypt data (also known as a cipher)

application firewall

A firewall that filters network requests based on the application sending or receiving data (also known as a socket-filter firewall)

asymmetric cipher

A cipher that uses one key to encrypt data and a different key to decrypt it (also known as a public-key cipher)

authentication

The process of identifying oneself to a computer system; for example, by typing a username and its associated password

authentication server

A server program that maintains a central database of each user's credentials

authenticator

In the 802.1X protocol, a device that confirms a user's credentials as stored on an authentication server and functions as a network switch

authorization

The process ...

Get Mac® Security Bible now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.