Acceptable Use Policy |
A set of rules and guidelines that outline the proper and acceptable use of a system, network, or service. |
Access Control |
The practice of restricting and managing user access to network resources based on predetermined security policies. |
Antivirus |
Software designed to detect and remove computer viruses, preventing them from spreading and causing harm to a computer network. |
Antivirus Software |
Software designed to detect and remove malicious software, such as viruses, from computer systems. |
Encryption |
The process of converting plaintext data into an unreadable form to protect it from unauthorized access or theft. |
Firewall |
A network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules. |
Incident Response Plan |
A documented set of procedures and guidelines that an organization follows when responding to and managing security incidents. |
Internet Usage Policy |
A policy that governs the appropriate use of the internet and outlines the rules for accessing and using online resources. |
Intrusion Detection System |
A system that monitors network traffic to identify and respond to unauthorized access attempts or malicious activities. |
Intrusion Prevention System |
A network security device that monitors and blocks malicious activities and prevents potential network attacks. |
Mitigation |
The process of reducing or eliminating the impact of a security incident or vulnerability by implementing preventive measures. |
Network Security Audit |
A process of assessing the security measures implemented in a network to identify vulnerabilities and potential risks. |
Network Segmentation |
The process of dividing a computer network into smaller subnetworks for improved security and performance. |
Penetration Testing |
A controlled attempt to exploit vulnerabilities in a network to assess its level of security. |
Security Policy |
A documented set of rules and procedures that define the organization's approach to network security and guide security implementations. |
Two-Factor Authentication |
A security measure that requires users to provide two separate forms of identification, typically a password and a unique code, to access a network or system. |
User Agreement |
A legally binding contract between a user and a service provider that establishes the terms and conditions for using the service. |
Virtual Private Network |
A secure network connection that allows remote users to access a private network over the internet securely. |
Vulnerability Scanning |
The process of identifying and assessing security vulnerabilities in a network infrastructure to address and mitigate potential risks. |