![]() |
cnc.ucr.edu
|
1 |
UCR Home > Computing & Communications > Security > Glossary A to Z Listing Campus Map Find People Search forStart Content (Navigation and Content columns) --> Glossary Main Navigation Security Home
This meaning has been disapproved |
2 |
ucr home > computing & communications > security > glossary a to z listing campus map find people search forStart Content (Navigation and Content columns) --> Glossary Main Navigation Security Home
This meaning has been disapproved |
3 |
Minimum Standards for Connecting to UCR's NetworkDesktop SecurityMobile SecurityServer SecurityNetwork SecurityFirewall ServicesSecurity Best PracticesCurrent page is: GlossarySecurity Tutorials & VideosProtecting Research DataProtecting PersonalEnd Sidebar --> Security - Glossary of Terms Index: A B C D E F G H I J K L M N O P Q R S T U V W XYZ A Access Control List (ACL) - List that contains a set of entries that define permission settings to explicitly control access (allow/reject) to resources.
This meaning has been disapproved |
4 |
minimum standards for connecting to ucr's networkdesktop securitymobile securityserver securitynetwork securityfirewall servicessecurity best practicescurrent page is: glossarysecurity tutorials & videosprotecting research dataprotecting personalEnd Sidebar --> Security - Glossary of Terms Index: A B C D E F G H I J K L M N O P Q R S T U V W XYZ A Access Control List (ACL) - List that contains a set of entries that define permission settings to explicitly control access (allow/reject) to resources.
This meaning has been disapproved |
5 |
ALERTA formatted message describing a circumstance relevant to network security.
|
6 |
antivirusType of program that protects a computer against a virus.
|
7 |
audit trailIn computer security systems, a chronological record of system resource usage. This includes user login, file access, other various activities, and whether any actual or attempted security violations occurred, legitimate and unauthorized.
|
8 |
AuthenticationA method for confirming a users identify.
|
9 |
AuthorizationDefinition of what resources and type of access are permitted.
|
10 |
Back doorSecret (undocumented), hard-coded access codes or procedures for accessing information. Some back doors exist in commercially provided software packages; e.g., consistent (canonical) passwords for third-party software accounts and is designed to hide itself inside a target host and allows the user that installed it to access the system without usin [..]
|