“Bluetooth-enabled” means that nearby devices can communicate with each other without a physical connection. Backups may be stored on the same machine that contains the original information, another machine, a storage device such as a thumb drive, or “in the cloud.” BluetoothĪ wireless protocol that allows two similarly equipped devices to communicate with each other within a short distance (e.g., 30 ft.). B BackupsĪ copy of information, files, and programs to facilitate recovery. Timely, reliable access to data, information, and systems by authorized users. Verifying the identity of a user, process, or system, often as a prerequisite to allowing access to resources in an information system. It may also cleanse already-infected computers. Antivirus/Anti-malware softwareĪ program designed to detect many forms of malware (e.g., viruses and spyware) and prevent them from infecting computers. Some systems may refer to administrators as having “root” or “elevated” access. Unlike regular user accounts, administrator accounts have full privileges and can perform tasks such as modifying computer hardware and software settings and managing user accounts. AdministratorĪ person who is responsible for managing a computer system or network. The process of granting or denying specific requests to: i) obtain and use information or related systems or services or ii) enter specific physical facilities. A | B| C | D | E | F | G | H | I | J | K | L | M | N | O | P | R | S | T | U | V | W | X | Y | Z A Access Control Unless otherwise noted, definitions have been adapted from terms in the NIST Computer Security Resource Center Glossary. This glossary contains brief descriptions of commonly used cybersecurity and related technology terms.
0 Comments
Leave a Reply. |