Articulate Engage Word Output

advertisement
Terminology
Advanced Persistent Threats
Network attack in which an unauthorized person gains access to a network
and stays there undetected for a long period of time.
The intention of an APT attack is to steal data rather than to cause damage to
the network or organization.
Compliance
Act of adhering to, and demonstrating adherence to, federal laws and
regulations as well as organizational policies and procedures.
Enterprise GRC
GRC applied to the wider organization, including operations, HR, Legal, and IT.
Full Network Packet Capture
The unrestricted, unfiltered, raw capture of all network packets.
Governance
Policies, standards, processes, laws, and regulations that define the structure
by which companies are directed and managed.
IT GRC
GRC applied to the IT organization, including its systems, technologies, and
processes.
Malware
Code that can cause business interruption, disclosure, or modification of
sensitive information.
Risk Management
Published by Articulate® Engage™
www.articulate.com
Coordinated activities to understand, direct, and control an organization to
realize and make decisions upon opportunities while managing negative risk
events.
Sandboxing
Mechanism to execute untested code or untrusted programs from unverified
third-parties, suppliers, untrusted users, and untrusted websites.
Published by Articulate® Engage™
www.articulate.com
Download