Security Management Guide (G06.24+, H06.03+)
Glossary
Security Management Guide—522283-008
Glossary-3
default security string
default security string. A security string associated with a Guardian process that defines 
the initial security string for all files created by that process. See also logon default 
security string and security string.
DES. Abbreviation for Data Encryption Standard. A standard method of encrypting a 64-bit 
block of data using a 56-bit key.
dial-up. A telephone connection through standard (switched) telephone lines.
directory. A type of OSS special file that contains entries that name links to other files.
distributed. Occurring over a geographic area or collection of systems on a network.
echo. A mode of interaction between a terminal and the computer system, where each 
character entered at the keyboard must be transmitted to the computer and back again 
before being displayed on the terminal screen. This interaction gives the computer 
system control over whether certain characters (such as the characters of a password) 
are displayed on the terminal.
effective group ID. An attribute of a process that is used to determine permissions such as 
the file access allowed for the process. The effective group ID of a process is the group 
ID that contributes to the group access privileges of that process. The effective group 
ID of a process might be used to set the group ID of files created by that process. The 
effective group ID can be changed while the process runs.
effective user ID. An attribute of a process that is used to determine permissions such as 
the file access allowed for the process. The effective user ID of a process is the user 
ID that determines the owner access privileges of that process. The effective user ID of 
a process might be used to set the user ID of files created by that process. The 
effective user ID can be changed while the process runs.
electronic mail. An application that provides the ability to create, deliver, and store 
messages between particular users, based on models provided by traditional mail 
representation.
electronically readable. Data represented on some media that a computer system can 
understand. For example, information on disk or tape is typically electronically 
readable, but the information on a handwritten note or a computer printout is typically 
not electronically readable.
encryption. An operation that transforms data in such a way that only the holder of certain 
information about the particular encryption (such as the encryption key and the 
encryption method) can restore the data to its original form. See also one-way 
encryption.
event-exit process. A user-written process that is allowed to participate in security policy 
enforcement.










