industry.siemens.com

Woonplaats:1
Upvotes received0
Downvotes received0
Karma:0 (upvotes-downvotes)



0 earned Badges

No badges were found



Definitions (99)

1

0 Thumbs up   0 Thumbs down

Access control list


List of all access permissions for a particular resource
Source: industry.siemens.com

2

0 Thumbs up   0 Thumbs down

Access protection


Measures that authorize or limit access to plant elements according to business and security aspects.
Source: industry.siemens.com

3

0 Thumbs up   0 Thumbs down

Anti-virus software


A program for identifying and eliminating malware on computer-based systems and in networks
Source: industry.siemens.com

4

0 Thumbs up   0 Thumbs down

Authentication


Process of verifying the identity of a user, process, or device. It is often a prerequisite for access to resources of an information system.
Source: industry.siemens.com

5

0 Thumbs up   0 Thumbs down

authenticity


Genuineness of an object
Source: industry.siemens.com

6

0 Thumbs up   0 Thumbs down

Authorization


Access right to system resources
Source: industry.siemens.com

7

0 Thumbs up   0 Thumbs down

Backdoor


Covert, undocumented method for accessing a computer system. A backdoor is a potential security risk.
Source: industry.siemens.com

8

0 Thumbs up   0 Thumbs down

Bot


Short for “robot”; a program used for specific tasks, such as sending spam messages or sending an endless number of data packets in denial-of-service attacks.
Source: industry.siemens.com

9

0 Thumbs up   0 Thumbs down

Botnet


A large group of infected computers that can be used to mount coordinated attacks.
Source: industry.siemens.com

10

0 Thumbs up   0 Thumbs down

Boundary protection


A method for protecting an industrial control system (ICS) and for separating it from office IT systems and the Internet.
Source: industry.siemens.com


To view all 99 definitions, please sign in.