Term
|
Definition
A record or list of individuals who have permission to enter a secure area, the time that they entered, and the time they left the area. |
|
|
Term
|
Definition
A log that can provide details regarding requests for specific files on a system. |
|
|
Term
|
Definition
Software that helps prevent computers from becoming infected by different types of spyware. |
|
|
Term
|
Definition
Software that can examine a computer for any infections as well as monitor computer activity and scan new documents that might contain a virus. |
|
|
Term
|
Definition
A log that can track user authentication attempts. |
|
|
Term
|
Definition
Logs that are the second common type of security-related operating system logs. |
|
|
Term
|
Definition
Spam filtering software that analyzes the contents of every word in an email and determines how frequently a word occurs in order to determine if it is spam. |
|
|
Term
|
Definition
A device that can be inserted into the security slot of a portable device and rotated so that the cable lock is secured to the device to prevent it from being stolen. |
|
|
Term
closed-circuit television (CCTV) |
|
Definition
Using video cameras to transmit a signal to a specific and limited set of receivers used for surveillance in areas that require security monitoring. |
|
|
Term
cross-site request forgery (XSRF) |
|
Definition
An attack that uses the user's Web browser settings to impersonate the user. |
|
|
Term
data loss prevention (DLP) |
|
Definition
A system that can identify critical data, monitor how it is being accessed, and protect it from unauthorized users. |
|
|
Term
|
Definition
A door lock that extends a solid metal bar into the door frame for extra security. |
|
|
Term
|
Definition
Faults in a program that occur while the application is running. |
|
|
Term
|
Definition
Logs that can document any unsuccessful events and the most significant successful events. |
|
|
Term
|
Definition
a restricted area by erecting a barrier. |
|
|
Term
|
Definition
Hardware or software that is designed to prevent malicious packets from entering or leaving computers. |
|
|
Term
|
Definition
A software testing technique that deliberately provides invalid, unexpected, or random data as inputs to a computer program. |
|
|
Term
|
Definition
Using the Global Positioning System (GPS) to detect the location of a portable device. |
|
|
Term
|
Definition
Creating a virtualized environment to simulate the central processing unit (CPU) and memory of the computer to check for the presence of a virus. |
|
|
Term
host-based software firewall |
|
Definition
A firewall that runs as a program on a local system to protect it against attacks. |
|
|
Term
|
Definition
Software that addresses a specific customer situation and often may not be distributed outside that customer's organization. |
|
|
Term
|
Definition
Verifying a user's input to an application. |
|
|
Term
|
Definition
A secure storage unit that can be used for storing portable devices. |
|
|
Term
|
Definition
A record of events that occur. |
|
|
Term
|
Definition
A device that monitors and controls two interlocking doors to a small room (a vestibule), designed to separate secure and nonsecure areas. |
|
|
Term
|
Definition
A general software security update intended to cover vulnerabilities that have been discovered. |
|
|
Term
|
Definition
Either a program or a feature incorporated within a browser that stops pop-up advertisements from appearing. |
|
|
Term
|
Definition
A device that detects an emitted signal in order to identify the owner. |
|
|
Term
|
Definition
A technology that can remotely erase data from a portable device and reset it to its default factory settings. |
|
|
Term
|
Definition
A ruggedized steel box with a lock. |
|
|
Term
|
Definition
Logs that are considered the primary source of log data. |
|
|
Term
|
Definition
A document or series of documents that clearly defines the defense mechanisms an organization will employ to keep information secure. |
|
|
Term
|
Definition
Software that is a cumulative package of all security updates plus additional features. |
|
|
Term
|
Definition
A sequence of bytes (a string) found in the virus as a virus signature. |
|
|
Term
|
Definition
Using encryption to mask the content of voice communications. |
|
|