The vocabulary of a person, language, or branch of knowledge.

On this page

Infosec Lexicon

Access Control List (ACL)

A mechanism that implements access control for a system resource by listing the identities of the system entities that are permitted to access the resource.

Access Control Service

A security service that provides protection of system resources against unauthorized access. The two basic mechanisms for implementing this service are ACLs and tickets.

Access Management Access

Management is the maintenance of access information which consists of four tasks: account administration, maintenance, monitoring, and revocation.

Access Matrix

An Access Matrix uses rows to represent subjects and columns to represent objects with privileges listed in each cell.

Account Harvesting

Account Harvesting is the process of collecting all the legitimate account names on a system.


Being responsible or obligated actions and results.


being correct and precise.

ACK Piggybacking

ACK piggybacking is the practice of sending an ACK inside another packet going to the same destination.

Active Content

Program code embedded in the contents of a web page. When the page is accessed by a web browser, the embedded code is automatically downloaded and executed on the user's workstation. Ex. Java, ActiveX (MS)

Activity Monitors

Activity monitors aim to prevent virus infection by monitoring for malicious activity on a system, and blocking that activity when possible.

Address Resolution Protocol (ARP)

  • Address Resolution Protocol (ARP) is a protocol for mapping an Internet Protocol address to a physical machine address that is recognized in the local network.
  • A table, usually called the ARP cache, is used to maintain a correlation between each MAC address and its corresponding IP address.
  • ARP provides the protocol rules for making this correlation and providing address conversion in both directions.

Advanced Encryption Standard (AES)

An encryption standard being developed by NIST. Intended to specify an unclassified, publicly-disclosed, symmetric encryption algorithm.


A finite set of step-by-step instructions for a problem-solving or computation procedure, especially one that can be implemented by a computer.


Opposite of Integrity


Java programs; an application program that uses the client's web browser to provide a user interface.


Advanced Research Projects Agency Network, a pioneer packet-switched network that was built in the early 1970s under contract to the US Government, led to the development of today's Internet, and was decommissioned in June 1990.

Join Our Community!

18+ hours of 📚 reading and 🧐 analysis distilled in a 10-minute crisp summary every 🗓️ month. – straight to your inbox.

Unsubscribe at any time!
Great! Check your inbox and click the link to confirm your subscription.
Error! Please enter a valid email address!