Software designed to identify and remove malware and hence stop malware from damaging a computer network.
A network device used to prevent hackers from accessing a network.
Are used to control which files or area of a network different groups of user can access.
Authentication using Strong Passwords
A method of identification of a user on a computer system (e.g. username and password, biometrics such as fingerprints).
When data is encoded (encrypted) and can only be decoded by computers with the correct decryption key.
Investigations undertaken by an organisation to find the cause and source of an attack on their network.
The process of simulating attacks on a network to identify weaknesses.
A set of rules and procedures members of an organisation are asked to follow to ensure their network remain secure.