CYBERARK 詞彙表

網路資安領域的技術詞彙及行業流行用語多不勝數。《CyberArk詞彙表》供您查找各種複雜術語,定義簡單易懂,資源便於查詢,助您進一步探索研究。

A

Active Directory

Active Directory (AD) is Microsoft’s directory and identity management service for Windows domain networks. AD is used for user authentication and authorization by a variety of Microsoft solutions like Exchange Server and SharePoint Server, as well as third-party applications and services.

深入瞭解

Active Directory

Adaptive Multi-factor Authentication

Adaptive Authentication is a method for using contextual information and business rules to determine which authentication factors to apply to a particular user in a particular situation. Businesses use Adaptive Authentication to balance security requirements with the user experience.

深入瞭解

Adaptive Multi-factor Authentication

App Gateway

An app gateway is an enterprise security solution that lets users access traditional web applications hosted in corporate data centers using the same logon credentials and methods they use to access mobile apps and cloud services.

深入瞭解

App Gateway

B

C

Cloud Security 雲端安全

雲端安全是指保護以雲端為基礎的應用程式、資料及虛擬基礎設施之完整性的做法。雲端安全包括所有雲端部署模型(公共雲、私有雲、混合雲、多雲)以及各類以雲端為基礎的服務及隨選解決方案(IaaS、PaaS、SaaS)。

深入瞭解

Cloud Security 雲端安全

D

Data Breach 資料外洩

資料外洩是一種安全事件,因惡意內部人員或外部攻擊者未經授權擅自存取機密資料或敏感資訊(例如病歷、財務資訊或個人識別資訊(PII))而引起。資料外洩是最常見且代價最高的網路資安事件之一。

深入瞭解

Data Breach 資料外洩

DevOps Security 開發維運安全

開發維運(DevOps)一詞形容將軟體開發(Dev)與IT營運(Ops)結合起來並提高組織快速交付應用程式與服務之能力的一系列文化概念、實踐做法及工具。開發維運會帶來新的風險及文化變化,進而產生傳統安全管理解決方案與實踐做法通常無法解決的安全挑戰。

深入瞭解

DevOps Security 開發維運安全

E

Endpoint Security 終端安全

終端安全是指保護企業網路免受來自本地端或遠端裝置之威脅的實踐做法。終端是可藉以進入公司資產及應用程式的裝置,這些裝置是潛在的網路資安漏洞。

深入瞭解

Endpoint Security 終端安全

F

G

H

I

Identity and Access Management (IAM)

Identity and Access Management (IAM) solutions enable administration of user identities and control of access to enterprise resources. IAM solutions ensure the right individuals have access to the right IT resources, for the right reasons, at the right time.

深入瞭解

Identity and Access Management (IAM)

Identity as a Service (IDaaS)

Identity as a Service (IDaaS) is an Identity and Access Management solution delivered in the form of a cloud-based service hosted and managed by a trusted third party. An IDaaS offering combines all the functions and benefits of an enterprise-class IAM solution with all the economic and operational advantages of a cloud-based service.

深入瞭解

Identity as a Service (IDaaS)

J

Just-In-Time Access 即時存取

利用即時(JIT)存取方法,組織可即時升級人類及非人類用戶的權限,針對某個應用程式或系統提供級別更高且分層分級的特權存取,以便執行必要的任務。資安產業分析師建議使用JIT存取,透過儘可能減少常規存取來提供安全的特權存取。

深入瞭解

Just-In-Time Access 即時存取

K

L

Least Privilege 最小特權

最小特權原則(PoLP)是一種資訊安全概念,即僅提供用戶執行工作職能所需之最低級別存取權限(或許可)。最小特權原則被公認為網路安全的最佳實踐做法,也是保護特權存取高價值資料與資產的基本必要措施。

深入瞭解

Least Privilege 最小特權

M

Malware 惡意軟體

惡意軟體是所有類型惡意軟體的統稱,這類軟體企圖蒙蔽最終用戶而損害和破壞電腦、伺服器、客戶端或電腦網路及基礎設施。網路攻擊者出於多種目的設計、使用及出售惡意軟體,但最常用於竊取個人、財務或商業資訊。

深入瞭解

Malware 惡意軟體

Multi-factor Authentication (MFA)

Adaptive Authentication is a method for using contextual information and business rules to determine which authentication factors to apply to a particular user in a particular situation. Businesses use Adaptive Authentication to balance security requirements with the user experience.

深入瞭解

Multi-factor Authentication (MFA)

N

O

P

Passwordless Authentication

Passwordless Authentication is an authentication method that allows a user to gain access to an application or IT system without entering a password or answering security questions.

深入瞭解

Passwordless Authentication

Privileged Access Management 特權存取管理(PAM)

特權存取管理是一個結合人員、流程與技術的全方位網路安全策略,以控制、監測、保護及審核整個企業 IT 環境內的所有人類與非人類特權身份及活動。企業組織實施特權存取管理來預防憑證竊盜及特權濫用造成的威脅。

深入瞭解

Privileged Access Management 特權存取管理(PAM)

Q

R

Ransomware 勒索軟體

勒索軟體是專為勒索受害者牟取經濟利益而設計的惡意軟體。勒索軟體一旦啟動,用戶即無法存取其檔案、應用程式或系統,直到支付贖金為止。通常要求以比特幣之類的貨幣交付贖金,以防追蹤。

深入瞭解

Ransomware 勒索軟體

Robotic Process Automation 機器人流程自動化(RPA)

機器人流程自動化(RPA)技術,可協助組織將標準化的作業全部或部分自動化。機器人流程自動化軟體機器人或「網路機器人」可模仿人類執行工作的行為動作。

深入瞭解

Robotic Process Automation 機器人流程自動化(RPA)

S

SaaS

軟體即服務(SaaS)是一種軟體授權及分發模型,服務供應商利用該模型託管應用程式,並透過網際網路提供給客戶。SaaS也被稱為「隨選軟體」、「託管軟體」及「Web軟體」,是雲端運算三個主要組成部分之一,也是數位化轉型的基本元素之一。

深入瞭解

SaaS

Secrets Management 金鑰管理

金鑰管理可讓組織對非人類身份實施一致的安全政策。金鑰管理可確保跨越工具堆疊、平台與雲端環境的資源僅可由經過身份驗證及授權的實體存取。

深入瞭解

Secrets Management 金鑰管理

Security Assertion Markup Language (SAML)

Security Assertion Markup Language (SAML) provides a standard way for businesses and application providers to share user authentication and authorization data and federate identity management functionality.

深入瞭解

Security Assertion Markup Language (SAML)

Single Sign-On (SSO)

Single Sign-On (SSO) is an authentication method that lets users access multiple applications and services using a single set of login credentials. SSO can help businesses improve user satisfaction and productivity, strengthen access security, and reduce IT operations expense and complexity.

深入瞭解

Single Sign-On (SSO)

T

U

V

Virtual Directory

A virtual directory is an Identity and Access Management architectural component that gives identity consumers a consolidated and unified view of identity management information stored in multiple disparate data repositories.

深入瞭解

Virtual Directory

W

X

Y

Z

Zero Trust 零信任

零信任是用於保護現代數位業務環境的策略性網路安全模型。零信任理念認為,組織不應自動信任任何人事物,不計其位於網路邊界內或外。零信任模型要求,試圖連接至組織系統的人員及個體均須先經驗證,方可取得存取權。

深入瞭解

Zero Trust 零信任

STAY IN TOUCH

STAY IN TOUCH!

Keep up-to-date on security best practices, events and webinars.