Security Management Guide (G06.24+, H06.03+)

Glossary
Security Management Guide—522283-008
Glossary-2
auto logoff
auto logoff. A process that terminates an interactive session after a preset number of
minutes in which the terminal has been idle or unattended.
backup. To copy online data to an offline storage media (such as tape) for safekeeping.
baseline security. A minimal level of implemented security policies and procedures that is
reasonable for a particular circumstance.
biometrics. The use of personal characteristics, such as fingerprints or eye blood vessel
prints, for user identification.
blind logon. A logon in which the password is not echoed or is otherwise made illegible.
break in. To gain unauthorized access to system resources.
bulk encryption. The act of encrypting data in an operation for later transmission or
storage. See also link encryption.
CAID. Abbreviation for creator access ID. The CAID identifies the user who initiated creation
of a process.
call-back. A method for using modems on standard phone lines that verifies that the call
came from an authorized location.
channel. An information transfer path within a system. Can also refer to the mechanism by
which the path is effected. See also covert channel.
CLEARONPURGE. A file option that causes the data in a file to be overwritten with zeros
when the file is purged. CLEARONPURGE can be set through FUP or SAFECOM.
$CMON. A user-written program that monitors (and possibly alters or denies) some
command interpreter activities, such as logon and program execution.
HP NonStop operating system. The operating system, which consists of the core and
system services. The operating system does not include any application program
interfaces.
compiler. A program that translates source code for a particular computer language into
executable machine instructions.
covert channel. A communication channel that allows a process to transfer information in a
manner that violates the system’s security policy.
data reduction. Generating summaries and exception reports from voluminous data so that
the reader of the resulting output is not overwhelmed with uninteresting details.
data integrity. Verified correspondence between the computer representation of information
and the real-world events that the information represents.
database. An organized collection of data for a particular function.