Midmarket IT Security Definitions

  • B

    Back Orifice

    Back Orifice is a rootkit program designed to expose the security deficiencies of Microsoft's Windows operating systems. The program's name is inspired by the name of Microsoft's BackOffice product. Created by a group of hackers called the Cult of the Dead Cow, Back Orifice allows someone at one computer to control everything on another, remote computer running Windows. (Continued)

  • C

    clean desk policy (CDP)

    A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office. Most CDPs require employees to clear their desks of all papers at the end of the day.

  • E

    email virus

    An e-mail virus is computer code sent to you as an e-mail note attachment which, if activated, will cause some unexpected and usually harmful effect, such as destroying certain files on your hard disk and causing the attachment to be remailed to everyone in your address book.

  • endpoint security (endpoint security management)

    Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted.

  • I

    intrusion detection (ID)

    Intrusion detection (ID) is a type of security management system for computers and networks. An ID system gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions (attacks from outside the organization) and misuse (attacks from within the organization). (Continued)

  • IPsec (Internet Protocol Security)

    IPsec (Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication.

  • M

    managed security services (MSS)

    Managed security services (MSS) is a systematic approach to managing an organization's security needs.

  • N

    network scanning

    Network scanning is a procedure for identifying active hosts on a network, either for the purpose of attacking them or for network security assessment.

  • P

    personal firewall (desktop firewall)

    A personal firewall (sometimes called a desktop firewall) is a software application used to protect a single Internet-connected computer from intruders. Personal firewall protection is especially useful for users with "always-on" connections such as DSL or cable modem.

  • port scan

    A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services, each associated with a "well-known" port number, the computer provides.

  • R

    remote access

    Remote access is the ability to get access to a computer or a network from a remote distance.

  • risk analysis

    Risk analysis is the process of defining and analyzing the dangers to individuals, businesses, and government agencies posed by potential natural and human-caused adverse events... (Continued)

  • rootkit

    A rootkit is a collection of tools (programs) that enables administrator-level access to a computer or computer network... (Continued)

  • S

    script kiddy (or script kiddie)

    Script kiddy (sometimes spelled kiddie) is a derogative term, originated by the more sophisticated crackers of computer security systems, for the more immature, but unfortunately often just as dangerous exploiter of security lapses on the Internet.

  • Snort

    Snort is an open source network intrusion detection system (NIDS) created by Martin Roesch.

-ADS BY GOOGLE

SearchSecurity

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

ComputerWeekly.com

Close