Midmarket IT Security Definitions

  • B

    Back Orifice

    Back Orifice is a rootkit program designed to expose the security deficiencies of Microsoft's Windows operating systems. The program's name is inspired by the name of Microsoft's BackOffice product. Created by a group of hackers called the Cult of the Dead Cow, Back Orifice allows someone at one computer to control everything on another, remote computer running Windows. (Continued)

  • C

    clean desk policy (CDP)

    A clean desk policy (CDP) is a corporate directive that specifies how employees should leave their working space when they leave the office. Most CDPs require employees to clear their desks of all papers at the end of the day.

  • E

    endpoint security (endpoint security management)

    Endpoint security is an approach to network protection that requires each computing device on a corporate network to comply with certain standards before network access is granted.

  • M

    managed security services (MSS)

    Managed security services (MSS) is a systematic approach to managing an organization's security needs.

  • N

    network scanning

    Network scanning is a procedure for identifying active hosts on a network, either for the purpose of attacking them or for network security assessment.

  • P

    personal firewall (desktop firewall)

    A personal firewall (sometimes called a desktop firewall) is a software application used to protect a single Internet-connected computer from intruders. Personal firewall protection is especially useful for users with "always-on" connections such as DSL or cable modem.

  • port scan

    A port scan is a series of messages sent by someone attempting to break into a computer to learn which computer network services, each associated with a "well-known" port number, the computer provides.

  • R

    remote access

    Remote access is the ability to get access to a computer or a network from a remote distance.

  • S

    script kiddy (or script kiddie)

    Script kiddy (sometimes spelled kiddie) is a derogative term, originated by the more sophisticated crackers of computer security systems, for the more immature, but unfortunately often just as dangerous exploiter of security lapses on the Internet.

  • Snort

    Snort is an open source network intrusion detection system (NIDS) created by Martin Roesch.

  • spam filter

    A spam filter is a program that is used to detect unsolicited and unwanted email and prevent those messages from getting to a user's inbox.

  • Z

    zombie computer (zombie bot)

    A zombie (also known as a bot) is a computer that a remote attacker has accessed and set up to forward transmissions (including spam and viruses) to other computers on the Internet. (Continued)

-ADS BY GOOGLE

SearchSecurity

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

ComputerWeekly.com

Close