Issue link: https://insights.oneneck.com/i/1458399
Glossary 69 These materials are © 2020 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited. Glossary Active Directory (AD): A directory service developed by Microsoft for identifying and authenticating users on a Microsoft Windows network or application. advanced persistent threat (APT): A sustained Internet-borne attack, usually perpetrated by a group with significant resources, such as organized crime or a nation-state. application programming interface (API): A set of protocols, routines and tools used to develop and integrate applications. Australian Privacy Principles: The Privacy Act 1988 establishes standards for collecting and handling personal information, referred to as the Australian Privacy Principles (APP). blended threat: Transforming a threat by making a relatively minor change to malicious code or by adding entirely new propagation and exploit mechanisms. botnet: A broad network of malware-infected endpoints (bots) working together and controlled by an attacker through C2 infrastructure. See also command-and-control (C2). bring your own device (BYOD): A mobile device policy that permits employees to use their personal mobile devices in the workplace for work-related and personal business. brute force: A type of attack in which the attacker attempts every possible combination of letters, numbers, and characters to crack a password, passphrase, or PIN. California Consumer Privacy Act (CCPA): A privacy rights and consumer protection statue for residents of California that was enacted in 2018 and became effective on January 1, 2020.