Laptop laptop has become a generic expression for all

Info icon This preview shows pages 12–14. Sign up to view the full content.

View Full Document Right Arrow Icon
Laptop - Laptop has become a generic expression for all portable computers. Laptops require extra security measures because of the portability and obvious attractiveness to thieves. Local Area Network - A private communications network owned and operated by a single organization within one location. This may comprise one or more adjacent buildings; however a local network will normally be connected by fixed cables or, more recently short-range radio equipment. A LAN will not use modems or telephone lines for internal communications, although it may well include such equipment to allow selected users to connect to the external environment. Log on / off - The processes by which users start and stop using a computer system. Network - A configuration of communications equipment and communication links by network cabling or satellite, which enables computers and their terminals to be geographically separated, while still connected to each other. See also Communications Network . Network Administrator - Individual(s) responsible for the availability of the Network, and the controlling of its use. Operating System - Computer programs that are primarily or entirely concerned with controlling the computer and its associated hardware, rather than processing work for users. Computers can operate without application software, but cannot run without an operating system. Penetration - Intrusion, trespassing, unauthorized entry into a system. Penetration Testing - The execution of a testing plan, the sole purpose of which is to attempt to hack into a system using known tools and techniques. Peripherals - Pieces of hardware attached to a computer rather than built into the machine itself. These include printers, scanners, external hard drive units, portable drives, and other items that can be plugged into a port. Procedure: PRC-2004-0803 Revision: 0.2.6 Effective Date: May 24, 2005 Page 12 of 15
Image of page 12

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
SECURITY PROCEDURE Firewalls IV. Definitions (con’t) Physical Security - Physical protection measures to safeguard the organization’s systems, including restrictions on entry to premises, restrictions on entry to computer department, locking/disabling equipment, disconnection, fire-resistant and tamper- resistant storage facilities, anti-theft measures, anti-vandal measures, etc. Policy - A policy may be defined as ‘An agreed approach in theoretical form, which has been agreed to / ratified by a governing body, which defines direction and degrees of freedom for action’. Privilege - Privilege is the term used throughout most (if not all) applications and systems to denote the level of operator permission, or authority. Privilege can be established at the file or folder (directory) level and can allow read only access, but prevent changes. Privileges can also refer to the extent to which a user is permitted to enter and confirm transactions / information within the system.
Image of page 13
Image of page 14
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern