Quick glossary: Cybersecurity countermeasures
- Provided by TechRepublic Premium
- Published January 12, 2020
- Topic TechRepublic Premium
- Format PDF
Cybersecurity attacks are inevitable for modern business. Therefore, it is vital that businesses deploy countermeasures to mitigate the damage these attacks cause. This quick glossary from TechRepublic Premium explains the terminology behind the most common cybersecurity countermeasures in use today and will help you understand what factors you should consider as you deploy your own.
From the glossary:
Refers to the means and mechanisms used to manage access to and the use of resources. In cybersecurity, the access being controlled is to computer networks and systems. To gain access to facilities and systems, users must have both proper identification credentials and authorization.
Any security program, software, hardware, or combination of both, de- signed to monitor a system for malicious software. Malicious software can include viruses, worms, Trojan Horses, etc.