This is a programme designed to assist users and employees to develop their understanding of their role into reducing information security breaches....
The process of confirming the identify of an individual who is trying to access and use a computer system.
While an audit log is data from one application or system, an audit trial is a combination of multiple logs in which...
A series of events that take place in order to carry out an attack which can be analysed to identify the perpetrator...
A type of software that prevents a computer from being infected with viruses/malware by scanning, detecting and removing the malware. Also known...
A system will only permit specific connections which have been identified within a database or ‘list’. For example, the list can contain...
An acronym for assess, improve and maintain. Assess: Review and identify key security areas of risk. Seeking out opportunity for improvement and...
Most cyber attacks are by ‘chancers’ hitting a lot of targets and hoping to find a common vulnerability somewhere to exploit. Advanced...