Privileged user a user who by virtue of function

Info icon This preview shows pages 13–15. Sign up to view the full content.

View Full Document Right Arrow Icon
Privileged User - A user who, by virtue of function, and/or seniority, has been allocated powers within the computer system, which are significantly greater than those available to the majority of users. Process - In computer terms, a process refers to one of dozens of program which are running to keep the computer running. When a software program is run, a number of processes may be started. Production System - A system is said to be in production when it is in live, day to day operation. Protocol - A set of formal rules describing how to transmit data, especially across a network. Low level protocols define the electrical and physical standards to be observed, bit and byte ordering and the transmission and error detection and correction of the bit stream. High level protocols deal with the data formatting, including the syntax of messages, the terminal to computer dialogue, character sets, sequencing of messages, etc. Security Administrator - Individual(s) who are responsible for all security aspects of a system on a day-to-day basis. Security Incident - A security incident is an alert to the possibility that a breach of security may be taking, or may have taken, place. Sensitive Information - Information is considered sensitive if it can be damaging to the University or its’ reputation. Split-tunnelling - Simultaneous direct access to a non-University network (such as the Internet, of a home network) from a remote device while connected into the University’s network via a VPN tunnel. Procedure: PRC-2004-0803 Revision: 0.2.6 Effective Date: May 24, 2005 Page 13 of 15
Image of page 13

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
SECURITY PROCEDURE Firewalls IV. Definitions (con’t) Spoofing - Spoofing is an alternative term for identity hacking and masquerading. The interception, alteration, and retransmission of data in an attempt to deceive the targeted recipient. Spot Check - The term ’spot check’ comes from the need to validate compliance with procedures by performing impromptu checks on records and other files, which capture the organization’s day-to-day activities. Unauthorized Disclosure - The intentional or unintentional revealing of restricted information to people who do not have a legitimate need to know that information. VPN - Virtual Private Network (VPN) is a method for accessing a remote network via “tunneling” through the Internet. Procedure: PRC-2004-0803 Revision: 0.2.6 Effective Date: May 24, 2005 Page 14 of 15
Image of page 14
SECURITY PROCEDURE Firewalls V. References University Policy 10-02-06, Administrative University Data Security and Privacy . CSSD Guideline GDL-2004-0803, Firewall Guidelines . CSSD Standard STD-2004-0803, Firewall Security Standards . CSSD Standard MSB-2004-0101, Firewall Minimum Security Baseline Standards . Procedure: PRC-2004-0803 Revision: 0.2.6 Effective Date: May 24, 2005 Page 15 of 15
Image of page 15
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern