cnc.ucr.edu

Website:https://its.ucr.edu/
Upvotes received0
Downvotes received0
Karma:0 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (65)

1

0 Thumbs up   0 Thumbs down

ALERT


A formatted message describing a circumstance relevant to network security.
Source: cnc.ucr.edu

2

0 Thumbs up   0 Thumbs down

antivirus


Type of program that protects a computer against a virus.
Source: cnc.ucr.edu

3

0 Thumbs up   0 Thumbs down

audit trail


In computer security systems, a chronological record of system resource usage. This includes user login, file access, other various activities, and whether any actual or attempted security violations occurred, legitimate and unauthorized.
Source: cnc.ucr.edu

4

0 Thumbs up   0 Thumbs down

Authentication


A method for confirming a users identify.
Source: cnc.ucr.edu

5

0 Thumbs up   0 Thumbs down

Authorization


Definition of what resources and type of access are permitted.
Source: cnc.ucr.edu

6

0 Thumbs up   0 Thumbs down

Back door


Secret (undocumented), hard-coded access codes or procedures for accessing information. Some back doors exist in commercially provided software packages; e.g., consistent (canonical) passwords for third-party software accounts and is designed to hide itself inside a target host and allows the user that installed it to access the system without usin [..]
Source: cnc.ucr.edu

7

0 Thumbs up   0 Thumbs down

Backup


The action of copying (or mirroring) important data to a second location or onto removable media for later retrieval if file/data is lost or destroyed.
Source: cnc.ucr.edu

8

0 Thumbs up   0 Thumbs down

Bandwidth


Speed at which information can be transferred.
Source: cnc.ucr.edu

9

0 Thumbs up   0 Thumbs down

compromise


An intrusion into a computer system where unauthorized disclosure, modification or destruction of information may have occurred.
Source: cnc.ucr.edu

10

0 Thumbs up   0 Thumbs down

Cracker(ing)


A malicious, criminal hacker who uses tools to decode or guess passwords to break into a computer system.
Source: cnc.ucr.edu


To view all 65 definitions, please sign in.