eBooks/eGuides

Data Center and Hybrid Cloud for Dummies

Issue link: https://insights.oneneck.com/i/1458399

Contents of this Issue

Navigation

Page 73 of 82

Glossary 69 These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. Glossary Active Directory (AD): A directory service developed by Microsoft for identifying and authenticating users on a Microsoft Windows network or application. advanced persistent threat (APT): A sustained Internet-borne attack, usually perpetrated by a group with significant resources, such as organized crime or a nation-state. application programming interface (API): A set of protocols, routines and tools used to develop and integrate applications. Australian Privacy Principles: The Privacy Act 1988 establishes standards for collecting and handling personal information, referred to as the Australian Privacy Principles (APP). blended threat: Transforming a threat by making a relatively minor change to malicious code or by adding entirely new propagation and exploit mechanisms. botnet: A broad network of malware-infected endpoints (bots) working together and controlled by an attacker through C2 infrastructure. See also command-and-control (C2). bring your own device (BYOD): A mobile device policy that permits employees to use their personal mobile devices in the workplace for work-related and personal business. brute force: A type of attack in which the attacker attempts every possible combination of letters, numbers, and characters to crack a password, passphrase, or PIN. California Consumer Privacy Act (CCPA): A privacy rights and consumer protection statue for residents of California that was enacted in 2018 and became effective on January 1, 2020.

Articles in this issue

Archives of this issue

view archives of eBooks/eGuides - Data Center and Hybrid Cloud for Dummies