computer-security-glossary.org

Website:https://www.computer-security-glossary.org/
Upvotes received0
Downvotes received0
Karma:0 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (155)

1

0 Thumbs up   0 Thumbs down

zombie


google_ad_client="pub-8027288574377500";google_ad_slot="1043341745";google_ad_width=120;google_ad_height=600; Definition: A Zombie is a computer whose operating system and resource [..]
Source: computer-security-glossary.org

2

0 Thumbs up   0 Thumbs down

what is ephi and are you a covered entity?


You need to be familiar with EPHI and the answer to each of the above questions; otherwise, you could be in real trouble if you are found to have a fiduciary obligation to comply with HIPAA’s “Securit [..]
Source: computer-security-glossary.org

3

0 Thumbs up   0 Thumbs down

access control


Definition: Access control means that a thorough specification has been made, based on information security policies, as to who has the right to gain physical and logical proximity to information reso [..]
Source: computer-security-glossary.org

4

0 Thumbs up   0 Thumbs down

account settings


Definition: Account Settings is a phrase that describes the characteristics associated with an authorized user’s profile within a computer network. These values are usually established when the user i [..]
Source: computer-security-glossary.org

5

0 Thumbs up   0 Thumbs down

accountability


Definition: Accountability is an essential information security concept. The phrase means that every individual who works with an information system should have specific responsibilities for informati [..]
Source: computer-security-glossary.org

6

0 Thumbs up   0 Thumbs down

anti-spam software


Definition: Anti-spam software is designed to block unsolicited messages. Spam is a slang term for the computer world’s junk mail or “telemarketing cold calls”. Frequently, however, unwanted and irrit [..]
Source: computer-security-glossary.org

7

0 Thumbs up   0 Thumbs down

assurance


Definition The word "assurance", within the context of information systems security, can be thought of as a set of organizational policies and procedures that addresses all of the tasks requ [..]
Source: computer-security-glossary.org

8

0 Thumbs up   0 Thumbs down

attachments


Definition: Attachments are digital files that typically arrive with email correspondence. Some are graphic-images, others are word processing documents, spreadsheet files or database reports. Receivi [..]
Source: computer-security-glossary.org

9

0 Thumbs up   0 Thumbs down

attacks


Definition: Attacks against information infrastructure may be categorized into two mains groups. One method would be electronic or logical-based (i.e. viruses, Trojan horses, etc.). Another would be p [..]
Source: computer-security-glossary.org

10

0 Thumbs up   0 Thumbs down

audits


Definition: Audits, as they relate to information systems, refer to comparing actual practices with existing policies and procedures. It’s an examination of information security processes. The main pu [..]
Source: computer-security-glossary.org


To view all 155 definitions, please sign in.