Policy Glossary J - L
A concept of information security by which users and their associated applications execute with the minimum amount of access required to perform their assigned duty or task.
The connection of one device or system to another through the use of software.
The amount of time for which logins to an account are disabled. Usually invoked once a threshold of invalid login attempts has been reached.