Security technique that regulates who or what can access resources within an organization’s network. Access control policies may include role-based, discretionary, or mandatory access control methods.
Access Control
Active Directory (AD)
A directory service developed by Microsoft for Windows domain networks that helps manage users, devices, and permissions.
Advanced Persistent Threat (APT)
A sophisticated and continuous cyber attack in which an attacker establishes an undetected presence in a network to steal data over time.
Artificial Intelligence (AI) in Cybersecurity
The use of machine learning and AI algorithms to detect and respond to cyber threats in real-time.
Backups
Complete backup of server data, regularly tested and restored to ensure viability.