Glossary of Terms

Online Threat Prevention

Keyword Definition
Acceptable Use Policy A set of rules and guidelines that outline the proper and acceptable use of a system, network, or service.
Access Control The practice of restricting and managing user access to network resources based on predetermined security policies.
Antivirus Software designed to detect and remove computer viruses, preventing them from spreading and causing harm to a computer network.
Antivirus Software Software designed to detect and remove malicious software, such as viruses, from computer systems.
Encryption The process of converting plaintext data into an unreadable form to protect it from unauthorized access or theft.
Firewall A network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules.
Incident Response Plan A documented set of procedures and guidelines that an organization follows when responding to and managing security incidents.
Internet Usage Policy A policy that governs the appropriate use of the internet and outlines the rules for accessing and using online resources.
Intrusion Detection System A system that monitors network traffic to identify and respond to unauthorized access attempts or malicious activities.
Intrusion Prevention System A network security device that monitors and blocks malicious activities and prevents potential network attacks.
Mitigation The process of reducing or eliminating the impact of a security incident or vulnerability by implementing preventive measures.
Network Security Audit A process of assessing the security measures implemented in a network to identify vulnerabilities and potential risks.
Network Segmentation The process of dividing a computer network into smaller subnetworks for improved security and performance.
Penetration Testing A controlled attempt to exploit vulnerabilities in a network to assess its level of security.
Security Policy A documented set of rules and procedures that define the organization's approach to network security and guide security implementations.
Two-Factor Authentication A security measure that requires users to provide two separate forms of identification, typically a password and a unique code, to access a network or system.
User Agreement A legally binding contract between a user and a service provider that establishes the terms and conditions for using the service.
Virtual Private Network A secure network connection that allows remote users to access a private network over the internet securely.
Vulnerability Scanning The process of identifying and assessing security vulnerabilities in a network infrastructure to address and mitigate potential risks.