cnc.ucr.edu

Website:https://its.ucr.edu/
Upvotes received0
Downvotes received0
Karma:0 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (65)

1

0 Thumbs up   0 Thumbs down

ucr home > computing & communications > security > glossary a to z listing campus map find people search for


Start Content (Navigation and Content columns) --> Glossary Main Navigation Security Home
Source: cnc.ucr.edu (offline)

2

0 Thumbs up   0 Thumbs down

minimum standards for connecting to ucr's networkdesktop securitymobile securityserver securitynetwork securityfirewall servicessecurity best practicescurrent page is: glossarysecurity tutorials & videosprotecting research dataprotecting personal


End Sidebar --> Security - Glossary of Terms Index: A B C D E F G H I J K L M N O P Q R S T U V W XYZ A Access Control List (ACL) - List that contains a set of entries that define permission settings to explicitly control access (allow/reject) to resources.
Source: cnc.ucr.edu (offline)

3

0 Thumbs up   0 Thumbs down

alert


A formatted message describing a circumstance relevant to network security.
Source: cnc.ucr.edu (offline)

4

0 Thumbs up   0 Thumbs down

antivirus


Type of program that protects a computer against a virus.
Source: cnc.ucr.edu (offline)

5

0 Thumbs up   0 Thumbs down

audit trail


In computer security systems, a chronological record of system resource usage. This includes user login, file access, other various activities, and whether any actual or attempted security violations occurred, legitimate and unauthorized.
Source: cnc.ucr.edu (offline)

6

0 Thumbs up   0 Thumbs down

authentication


A method for confirming a users identify.
Source: cnc.ucr.edu (offline)

7

0 Thumbs up   0 Thumbs down

authorization


Definition of what resources and type of access are permitted.
Source: cnc.ucr.edu (offline)

8

0 Thumbs up   0 Thumbs down

back door


Secret (undocumented), hard-coded access codes or procedures for accessing information. Some back doors exist in commercially provided software packages; e.g., consistent (canonical) passwords for third-party software accounts and is designed to hide itself inside a target host and allows the user that installed it to access the system without usin [..]
Source: cnc.ucr.edu (offline)

9

0 Thumbs up   0 Thumbs down

backup


The action of copying (or mirroring) important data to a second location or onto removable media for later retrieval if file/data is lost or destroyed.
Source: cnc.ucr.edu (offline)

10

0 Thumbs up   0 Thumbs down

bandwidth


Speed at which information can be transferred.
Source: cnc.ucr.edu (offline)


To view all 65 definitions, please sign in.