A list of permissions attached to an object which specifies who or what is allowed to access the object and what operations are allowed to be performed on the object.
A method of keeping in check the Internet traffic that attempts to flow through a given hub, router, firewall, or similar device.