8. Glossary
Actions planifiées; planned action
Operations with a future completion date planned by attackers who have succeeded in breaking into a system, with a view to compromising it again, or even enabling a new intrusion.
IP address; IP address/location
Identification number of a device connected to an Internet Protocol network.
Investigative analyst; forensic analyst
IT expert in charge of IT security audits and investigations, from preventive intrusion tests to audits aimed at describing the course of an attack, its causes and potential responses.
Enterprise directory; Activ Directory (AD)
A database and services linking an organization's users and applications. This database contains key information on the sensitivity...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Glossary
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
Bibliography
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!