Access Control
A security mechanism that manages who or what can view, access, or use resources in a computing environment. It involves authentication and authorization processes to ensure only authorized users can access specific resources.
Access Control List (ACL)
A set of rules used for filtering network traffic and controlling access to system objects such as directories or files. ACLs determine which users or system processes are given access to objects & what operations are allowed.
Active Directory
A directory service designed by Microsoft for Windows Server environments that manages and organizes network resources, including users, computers, and other devices in a network hierarchy.
Backdoor Attack
A cyber attack where hackers gain unauthorized access to systems, networks, or applications by exploiting vulnerabilities or hidden entry points.
Bring Your Own Device (BYOD)
A policy that permits employees to use their personal devices for work purposes while maintaining security standards and protecting company data.
Brute Force Attack
A cyber attack method that attempts to gain unauthorized access by methodically trying all possible mixtures of passwords or encryption keys.
CASB DLP
A combination of Cloud Access Security Broker and Data Loss Prevention capabilities that protect sensitive data across cloud services & applications.
CASB Tool
Software solutions that implement Cloud Access Security Broker functionality to protect cloud applications and data.
Data Loss
The unintended deletion, corruption, or unavailability of data, whether through human error, system failure, or malicious activity.
Data Store
A repository for persistently storing & managing collections of data which includes databases, data lakes, and file systems.
HIPAA
Health Insurance Portability & Accountability Act - U.S. legislation that protects medical information privacy.
HITECH
Health Information Technology for Economic & Clinical Health Act - legislation that strengthens HIPAA enforcement.
IT Compliance
Adherence to requirements set by laws, regulations, and industry standards for IT systems.
Insider Threat
Security risks posed by individuals with legitimate access to an organization's systems.
Information Security Policy
Documented guidelines for protecting an organization's information assets.
Malware
Malicious software created to damage, disrupt, or gain unauthorized access to computer systems.
Masked Data
Information that has been modified to hide sensitive elements while maintaining a similar structure.
Network DLP
Data Loss Prevention solutions that monitor and protect data moving through network traffic.
Network Security
Measures taken to protect the usability and integrity of computer networks and data.
Vulnerability
A weakness or fault in a system, application, or process that could be exploited by malicious actors to attain unauthorized access, steal data, or disrupt operations. This can include software bugs, misconfigurations, weak passwords, or design flaws that compromise security.