McAfee Change Control, the Glossary
McAfee Change Control is a commercial file integrity monitoring solution for Windows- and Linux-based systems developed by McAfee.[1]
Table of Contents
6 relations: English language, File integrity monitoring, Linux, McAfee, Microsoft Windows, Proprietary software.
- Intrusion detection systems
English language
English is a West Germanic language in the Indo-European language family, whose speakers, called Anglophones, originated in early medieval England on the island of Great Britain.
See McAfee Change Control and English language
File integrity monitoring
File integrity monitoring (FIM) is an internal control or process that performs the act of validating the integrity of operating system and application software files using a verification method between the current file state and a known, good baseline.
See McAfee Change Control and File integrity monitoring
Linux
Linux is both an open-source Unix-like kernel and a generic name for a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds.
See McAfee Change Control and Linux
McAfee
McAfee Corp., formerly known as McAfee Associates, Inc. from 1987 to 1997 and 2004 to 2014, Network Associates Inc. from 1997 to 2004, and Intel Security Group from 2014 to 2017, is an American global computer security software company headquartered in San Jose, California.
See McAfee Change Control and McAfee
Microsoft Windows
Microsoft Windows is a product line of proprietary graphical operating systems developed and marketed by Microsoft.
See McAfee Change Control and Microsoft Windows
Proprietary software
Proprietary software is software that grants its creator, publisher, or other rightsholder or rightsholder partner a legal monopoly by modern copyright and intellectual property law to exclude the recipient from freely sharing the software or modifying it, and—in some cases, as is the case with some patent-encumbered and EULA-bound software—from making use of the software on their own, thereby restricting their freedoms.
See McAfee Change Control and Proprietary software
See also
Intrusion detection systems
- Advanced Intrusion Detection Environment
- Application protocol-based intrusion detection system
- Host-based intrusion detection system
- Host-based intrusion detection system comparison
- Incident Object Description Exchange Format
- Intrusion Detection Message Exchange Format
- Intrusion detection system
- LARIAT
- McAfee Change Control
- Network tap
- OSSEC
- Open Source Tripwire
- Prelude SIEM (Intrusion Detection System)
- Protocol-based intrusion detection system
- Sagan (software)
- Samhain (software)
- Security Device Event Exchange
- Snort (software)
- Suricata (software)
- TZSP
- Zeek