BACK


 

Account Monitoring and Control

Overseer and control tools to observe employee system activity

 

Authorized Access Inventory

List of all accesses to sensitive data

 

Cyberattack

Intentional attempt to damage or steal files in a computer network by a hacker

 

Operating System

The most fundamental computer software that allows for its basic operations, and bridges people to components with a user interface

 

Threat Analysis

Examination of potential digital vulnerabilities within a company system for most effective security measures