Quarantine processing: The isolation of potentially infected or malicious data or software from the rest of a system or network in order to prevent it from spreading or causing damage. It is used in cybersecurity to protect networks and systems from malware and other forms of cyberattack. Examples include using virtual machines or sandboxes to run untrusted software, using intrusion detection systems to identify and block suspicious traffic, and implementing access controls to prevent unauthorized access to quarantined data or systems.
Categories: CC D5: Security Operations | CCSP D5: Cloud Security Operations | CISM D4: Incident Management | CISSP D7: Security Operations | Security+ D4: Security Operations | SSCP D7: Systems and Application Security
« Back to Glossary Index