Double click on the one you want and a new window

Info icon This preview shows pages 9–12. Sign up to view the full content.

View Full Document Right Arrow Icon
Double-click on the one you want and a new window will appear. 8.2 Select the desired new user from the left side of the window and then click the Add button. Go to the File menu and select Save and Close . Procedure: PRC-2004-0803 Revision: 0.2.6 Effective Date: May 24, 2005 Page 9 of 15
Image of page 9

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
SECURITY PROCEDURE Firewalls IV. Definitions Availability - Assurance that the systems responsible for delivering, storing and processing information are accessible when needed, by those who need them. Business Assets - The term Business Assets, as it relates to Information Security, refers to any information upon which the organization places a measurable value. By implication, the information is not in the public domain and would result in loss, damage, or even business collapse, if the information were to be lost, stolen, corrupted or in any way compromised. Communications Equipment - Hardware, with associated software, relating to the ability of computers to receive data from, and transmit data to, locations separated from the central processor. Communications Line - Within a communications network, the route by which data is conveyed from one point to another. Communications Network - A system of communications equipment and communication links (by line, radio, satellite, etc.), which enables computers to be separated geographically, while still ‘connected’ to each other. Computer System - One or more computers, with associated peripheral hardware, with one or more operating systems, running one or more application programs, designed to provide a service to users. Confidentiality - Assurance that the information is shared only among authorized persons or organizations. Breaches of Confidentiality can occur when data is not handled in a manner adequate to safeguard the confidentiality of the information concerned. Such disclosure can take place by word of mouth, by printing, copying, e-mailing or creating documents and other data, etc. Cracker - A cracker is either a piece of software (program) whose purpose is to ‘crack’ the code (i.e.: a password), or ‘cracker’ refers to a person who attempts to gain unauthorized access to a computer system. Such persons are usually ill intentioned and perform malicious acts. Data/Information - In the area of Information Security, data is processed, formatted, and re-presented, so that it gains meaning and thereby becomes information. Information Security is concerned with the protection and safeguard of that information, which in its various forms can be identified as Business Assets . Default - A default is a setting or value, that a computer program (or system) is given as a standard setting. It is likely to be the setting that ‘most people’ would choose. Procedure: PRC-2004-0803 Revision: 0.2.6 Effective Date: May 24, 2005 Page 10 of 15
Image of page 10
SECURITY PROCEDURE Firewalls IV. Definitions (con’t) Denial of Service - A Denial of Service (DoS) attack, is an Internet attack against a Web site whereby a client is denied the level of service expected. In a mild case, the impact can be unexpectedly poor performance. In the worst case, the server can become so overloaded as to cause a crash of the system.
Image of page 11

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 12
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern