Sirkure - Cybersecurity & Security Platform

Stay updated with the latest on Cybersecurity, Data Privacy and Security news and information here.

Cybersecurity Glossary and Terms

Thursday
18
Mar

Access Rights

 Access rights are permissions that are granted to a user, or an application, to view, modify or delete files in the network. These rights can be assigned to a particular client, server, folder, specific programs or data files.

  1 Hits
Wednesday
17
Mar

Access Profile

 An access profile is accessibility information about a user that is stored on a computer. A profile includes the user's password, name and what information/systems they are allowed or denied access to.

  1 Hits
Wednesday
17
Mar

Access Point

An access point is a computer networking device which allows a Wi-Fi compliant device to connect to a wired network wirelessly. It usually connects via a router. It is frequently referred to as a WAP (wireless access point). 

  2 Hits
Wednesday
17
Mar

Access Path

 An access path is a process where a specified quantity of material moves as a unit between work stations, while maintaining its unique identity. In database management system (RDBMS) terminology, access path refers to the path chosen by the system to retrieve data after a SQL request is executed.

  0 Hits
Wednesday
17
Mar

Access Control List (ACL)

 Access control list (ACL) is a list of permissions attached to an object in a computer file. Each ACL contains a list of access control entries (ACE) that specifies which users or system processes are granted access, denied access or are audited for a securable object. What is an Access Control List? An access control list (ACL) contains rule...

Continue reading
  1 Hits
Wednesday
17
Mar

Acceptable Use Policy

An acceptable use policy establishes the rules that one must agree to in order to be provided access to a network or internet. The policy also sets guidelines on how the network should be used. 

  1 Hits
Tags:
Wednesday
17
Mar

Acceptable Interruption Window

 The maximum period of time that a system can be unavailable before compromising the achievement of the enterprise's business objectives.

  1 Hits