|
computer-security-glossary.org
|
0 earned Badges No badges were found
Definitions (155)
1 |
0
0
zombie
google_ad_client="pub-8027288574377500";google_ad_slot="1043341745";google_ad_width=120;google_ad_height=600; Definition: A Zombie is a computer whose operating system and resource [..]
Meaning awaits approval from a moderator |
2 |
0
0
what is ephi and are you a covered entity?
You need to be familiar with EPHI and the answer to each of the above questions; otherwise, you could be in real trouble if you are found to have a fiduciary obligation to comply with HIPAA’s “Securit [..]
Meaning awaits approval from a moderator |
3 |
0
0
access control
Definition: Access control means that a thorough specification has been made, based on information security policies, as to who has the right to gain physical and logical proximity to information reso [..]
Meaning awaits approval from a moderator |
4 |
0
0
account settings
Definition: Account Settings is a phrase that describes the characteristics associated with an authorized user’s profile within a computer network. These values are usually established when the user i [..]
Meaning awaits approval from a moderator |
5 |
0
0
accountability
Definition: Accountability is an essential information security concept. The phrase means that every individual who works with an information system should have specific responsibilities for informati [..]
Meaning awaits approval from a moderator |
6 |
0
0
anti-spam software
Definition: Anti-spam software is designed to block unsolicited messages. Spam is a slang term for the computer world’s junk mail or “telemarketing cold calls”. Frequently, however, unwanted and irrit [..]
Meaning awaits approval from a moderator |
7 |
0
0
assurance
Definition The word "assurance", within the context of information systems security, can be thought of as a set of organizational policies and procedures that addresses all of the tasks requ [..]
Meaning awaits approval from a moderator |
8 |
0
0
attachments
Definition: Attachments are digital files that typically arrive with email correspondence. Some are graphic-images, others are word processing documents, spreadsheet files or database reports. Receivi [..]
Meaning awaits approval from a moderator |
9 |
0
0
attacks
Definition: Attacks against information infrastructure may be categorized into two mains groups. One method would be electronic or logical-based (i.e. viruses, Trojan horses, etc.). Another would be p [..]
Meaning awaits approval from a moderator |
10 |
0
0
audits
Definition: Audits, as they relate to information systems, refer to comparing actual practices with existing policies and procedures. It’s an examination of information security processes. The main pu [..]
Meaning awaits approval from a moderator |
To view all 155 definitions, please sign in.