Awareness training and insider threats Definitions

Browse Definitions
Search Definitions
  • C

    CISO (chief information security officer)

    The CISO (chief information security officer) is a senior-level executive responsible for developing and implementing an information security program, which includes procedures and policies designed to protect enterprise communications, systems and assets from both internal and external threats.

  • D

    dumpster diving

    Dumpster diving is looking for treasure in someone else's trash.

  • E

    endpoint security management

    Endpoint security management requires endpoint devices to comply with specific security policies before they are granted access to network resources.

  • H

    Honeynet Project

    The Honeynet Project is a non-profit volunteer organization dedicated to computer security research and information sharing.

  • I

    insider threat

    Insider threat is a generic term for a threat to an organization's security or data that comes from within.

  • M

    micro-botnet (mini-botnet or baby botnet)

    A micro-botnet, also called a mini-botnet or baby botnet, is a small network of Internet-connected computers that have been hijacked to attack specific companies or individuals within a company.

  • N

    National Computer Security Center (NCSC)

    The National Computer Security Center (NCSC) is a U.S. government organization within the National Security Agency (NSA) that evaluates computing equipment for high security applications to ensure that facilities processing classified or other sensitive material are using trusted computer systems and components.

  • S

    security awareness training

    Security awareness training is a formal process for educating employees about corporate policies and procedures for working with information technology (IT). Regular training is particularly necessary in organizations with high turnover rates and those that rely heavily on contract or temporary staff.

  • set

    A set is a group or collection of objects or numbers, considered as an entity unto itself. SET is also an acronym for Secure Electronic Transaction.

  • shoulder surfing

    Shoulder surfing is using direct observation techniques, such as looking over someone's shoulder, to get information.

  • single-factor authentication (SFA)

    Single-factor authentication (SFA) is the traditional security process that requires a user name and password before granting access to the user.

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves tricking people into breaking normal security procedures.

  • T

    Total Information Awareness (TIA)

    Total Information Awareness (TIA) is the name of a massive U.S. data mining project focused on scanning travel, financial and other data from public and private sources with the goal of detecting and preventing transnational threats to national security.

  • trusted computing

    Trusted computing is a broad term that refers to technologies and proposals for resolving computer security problems through hardware enhancements and associated software modifications... (Continued)

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close