Security Management Guide (G06.24+, H06.03+)
Security Management Guide—522283-008
Glossary-1
Glossary
access control list (ACL). A list of subjects that are allowed access to a particular object.
The list specifies the types of access allowed for all subjects on the list. The Safeguard
software maintains access control lists for all objects under its protection.
administrative group name. The Guardian name for a group of users who have the same
administrative group ID.
accountability. The ability to provide a correlation between an action and the individual
responsible for that action.
ACL. Abbreviation for access control list.
alias. An alternate name assigned to a user to purposes of logging on to the system. The
alias can have user attributes that differ from those assigned to the underlying user ID.
alphanumeric. Pertaining to a character set consisting of letters, numbers, and punctuation
marks.
alphabetic. Pertaining to a character set consisting of letters only.
application. A program or collection of programs written by customers or third-party
vendors to meet the customer’s particular computing needs: for example, an
accounting application.
ASCII. Abbreviation for American Standard Code for Information Interchange. A coded set
of printable characters and control characters. Terminals and data lines typically
communicate using ASCII codes.
audit. To examine a record of system events to determine conformance to security controls
and procedures.
audit pool. One or more files, on a specified HP subvolume, containing audit records. The
collection of audit pools on a NonStop system comprises the audit trail.
audit trail. A record of system events, either printed or electronically readable, used to
perform an audit.
authentication. The act of identifying and validating a user of an information system. For
example, logging on associates a person having the proper password with a user
process.
authorization. The act of granting specified access to system resources. Both the Guardian
environment and the Safeguard subsystem provide the fundamental authorization
mechanisms on a NonStop system. Some applications might have additional
authorization mechanisms.