Security Management Guide (G06.24+, H06.03+)
Glossary
Security Management Guide—522283-008
Glossary-2
auto logoff
auto logoff. A process that terminates an interactive session after a preset number of 
minutes in which the terminal has been idle or unattended.
backup. To copy online data to an offline storage media (such as tape) for safekeeping.
baseline security. A minimal level of implemented security policies and procedures that is 
reasonable for a particular circumstance.
biometrics. The use of personal characteristics, such as fingerprints or eye blood vessel 
prints, for user identification.
blind logon. A logon in which the password is not echoed or is otherwise made illegible.
break in. To gain unauthorized access to system resources.
bulk encryption. The act of encrypting data in an operation for later transmission or 
storage. See also link encryption.
CAID. Abbreviation for creator access ID. The CAID identifies the user who initiated creation 
of a process.
call-back. A method for using modems on standard phone lines that verifies that the call 
came from an authorized location.
channel. An information transfer path within a system. Can also refer to the mechanism by 
which the path is effected. See also covert channel.
CLEARONPURGE. A file option that causes the data in a file to be overwritten with zeros 
when the file is purged. CLEARONPURGE can be set through FUP or SAFECOM.
$CMON. A user-written program that monitors (and possibly alters or denies) some 
command interpreter activities, such as logon and program execution.
HP NonStop operating system. The operating system, which consists of the core and 
system services. The operating system does not include any application program 
interfaces.
compiler. A program that translates source code for a particular computer language into 
executable machine instructions.
covert channel. A communication channel that allows a process to transfer information in a 
manner that violates the system’s security policy.
data reduction. Generating summaries and exception reports from voluminous data so that 
the reader of the resulting output is not overwhelmed with uninteresting details.
data integrity. Verified correspondence between the computer representation of information 
and the real-world events that the information represents.
database. An organized collection of data for a particular function.










