Professional Documents
Culture Documents
Access control Controls who has access to an endpoint, device, file share, network share or online
service as well as the information it stores.
Authentication The process to verify that someone is who they claim to be when they try to access
a computing resource.
DMZ Segment of a network where servers accessed by less trusted users are isolated.
The name is derived from the term “demilitarized zone.”
Hacker Someone who uses a computer system to gain unauthorized access to another
system for data or who makes another system unavailable.
Intrusion detection A device or software application that monitors a network or systems for malicious
system (IDS) activity or policy violations.
Intrusion prevention Intrusion detection system that also blocks when policy violations have occurred.
system (IPS)
Malware Software intended to infiltrate and damage or disable computers. Shortened form
of “malicious software.”
Remediation The process by which organizations identify and resolve threats to their systems.
Risk The possibility that an event will occur and adversely affect the achievement of an
objective.
Security control Something that modifies or reduces one or more security risks.
Security information A solution that collects, analyzes, and correlates network, event and log data for
and event the detection of suspicious activity and compliance.
management (SIEM)
Threat actor Any individual or group of individuals that attempts to or successfully conducts
malicious activities against enterprises, whether intentionally or unintentionally.
Two-factor A method of confirming identity utilizing something known (like a password) and
authentication something possessed or a part of the individual (like entering a code sent via SMS
or a thumbprint recognition).
Virus Malware that is loaded onto a computer and then runs without the user’s
knowledge, or without knowledge of its full effects.
COPYRIGHT 2020 TENABLE, INC. ALL RIGHTS RESERVED. TENABLE, TENABLE.IO, TENABLE NETWORK SECURITY, NESSUS, SECURITYCENTER, SECURITYCENTER CONTINUOUS VIEW AND LOG CORRELATION ENGINE ARE REGISTERED
TRADEMARKS OF TENABLE, INC. TENABLE.SC, TENABLE.OT, LUMIN, INDEGY, ASSURE, AND THE CYBER EXPOSURE COMPANY ARE TRADEMARKS OF TENABLE, INC. ALL OTHER PRODUCTS OR SERVICES ARE TRADEMARKS OF THEIR
RESPECTIVE OWNERS.