A

Antivirus

software designed to detect and prevent computer viruses and other malware from entering and harming a system.

Application Security

the use of software, hardware and procedural methods to protect applications from external and internal threats.

Artificial Intelligence

the theory and development of computer systems able to perform tasks that normally require human intelligence, such as visual perception, speech recognition, decision-making and translation between languages.

Asset

any item perceived as having value; includes both tangible items such as information systems and physical property, as well as intangibles such as intellectual property and data.

Attack Surface

the sum of the security risk exposure; it is the aggregate of all known, unknown and potential vulnerabilities and controls across all software, hardware, firmware and networks. A smaller attack surface can help make your organization less exploitable, reducing risk. A typical attack surface has complex interrelationships among three main areas of exposure: software attack surface, network attack surface and the often overlooked human attack surface.

Software Attack Surface

comprised of the software environment and its interfaces. These are the applications and tools available to authorized (and unauthorized) users.

Network Attack Surface

presents exposure related to ports, protocols, channels, devices (from routers and firewalls to laptops and smart phones), services, network applications (SaaS) and even firmware interfaces.

Human Attack Surface

humans have a range of complex vulnerabilities that are frequently exploited. One of the great strengths of highly secure organizations is their emphasis on communicating security awareness and safety principles to their employees, partners, supply chain and even their customers.

Authentication

the process or action of verifying the identity of a user or process.

Authorization

the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular.

Last updated