endpoint security
Acronyms
- None
Preferred Term
- None
Non-standard Terms
Definitions
Type | Definition | Sources |
---|---|---|
Noun | The methods and practices used to prevent unauthorized access to systems and information at the user (terminal) end. (used 0 times in citations and controls) |
|
Noun | Refers to a methodology of protecting the corporate network when accessed with remote devices, such as laptops, or other wireless and mobile devices. Each device with a remote connection to the network creates a potential entry (or exit) point for security threats. (used 72 times in citations and controls) |
Other Forms
Type | Other Form |
---|---|
Plural | endpoint security |
Plural Possessive | endpoint security's |
Possessive | endpoint security's |
Relationships
Common Controls
Displaying Controls in which this term is tagged –
Show all Controls containing this term regardless of tagging
Displaying Controls containing this term –
Show only Controls in which this term is tagged
ID | Control |
---|---|
{{ control.id }} | {{ control.name }} |
None |
Citations
Displaying Citations in which
this term is tagged –
Show all Citations containing this term regardless of tagging
Displaying Citations containing this term –
Show only Citations in which
this term is tagged
AD ID | Authority Document | CT ID | Reference | Guidance | CC ID |
---|---|---|---|---|---|
{{ citation.authority_document.id }} | {{ citation.authority_document.common_name }} | {{ citation.id }} | {{ citation.reference }} | {{ citation.guidance_as_tagged || citation.guidance }} | {{ citation.control.id }} None |
None |