industry.siemens.com

Woonplaats:1
Upvotes received0
Downvotes received0
Karma:0 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (99)

1

0 Thumbs up   0 Thumbs down

access control list


List of all access permissions for a particular resource
Source: industry.siemens.com (offline)

2

0 Thumbs up   0 Thumbs down

access protection


Measures that authorize or limit access to plant elements according to business and security aspects.
Source: industry.siemens.com (offline)

3

0 Thumbs up   0 Thumbs down

anti-virus software


A program for identifying and eliminating malware on computer-based systems and in networks
Source: industry.siemens.com (offline)

4

0 Thumbs up   0 Thumbs down

authentication


Process of verifying the identity of a user, process, or device. It is often a prerequisite for access to resources of an information system.
Source: industry.siemens.com (offline)

5

0 Thumbs up   0 Thumbs down

authenticity


Genuineness of an object
Source: industry.siemens.com (offline)

6

0 Thumbs up   0 Thumbs down

authorization


Access right to system resources
Source: industry.siemens.com (offline)

7

0 Thumbs up   0 Thumbs down

backdoor


Covert, undocumented method for accessing a computer system. A backdoor is a potential security risk.
Source: industry.siemens.com (offline)

8

0 Thumbs up   0 Thumbs down

bot


Short for “robot”; a program used for specific tasks, such as sending spam messages or sending an endless number of data packets in denial-of-service attacks.
Source: industry.siemens.com (offline)

9

0 Thumbs up   0 Thumbs down

botnet


A large group of infected computers that can be used to mount coordinated attacks.
Source: industry.siemens.com (offline)

10

0 Thumbs up   0 Thumbs down

boundary protection


A method for protecting an industrial control system (ICS) and for separating it from office IT systems and the Internet.
Source: industry.siemens.com (offline)


To view all 99 definitions, please sign in.