Skip to Main Content
Idaho State University home

Glossary

Filter:
# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
C
C*
C1
C2
C3
C3I
C4
CA
Can
Cat
CBA
CBC
CCB
CCI
CCO
CDR
CDS
CF
CFD
CFE
CI
CIA
CIK
CIP
CK
CKG
CKL
CM
CMP
CMS
CN
CNK
COR
CPC
Cpi
CPS
CPU
CRB
CRC
CRO
CRP
CSA
CSC
CSE
CSM
CSO
CSS
CTY
CUP
CVA
CWC
Computer Security
  • (COMPUSEC) The protection of the information and physical assets of a computer system. The protection of information aims to prevent the unauthorized disclosure, manipulation, destruction or alteration of data. The protection of physical assets implies security measures against theft, destruction or misuse of equipment, i. e. , processors, peripherals, data storage media, communication lines and interfaces. (MS)
  • The protection resulting from all measures designed to prevent deliberate or inadvertent unauthorized disclosure, acquisition, manipulation, modification, or loss of information contained in a computer system, as well as measures designed to prevent denial of authorized use of the system. (NCSC-9)
  • All security features needed to provide an acceptable level of protection for hardware, software, and classified, sensitive unclassified or critical data, material, or processes in the system. It includes: a. Hardware and software functions, characteristics, and features. b. Operational procedures. c. Accountability procedures. d. Access controls at computer facilities (includes those housing mainframes, terminals, minicomputers, or microcomputers). e. Management constraints. f. Physical protection. g. Control of compromising emanations (TEMPEST). h. Communications security (COMSEC). i. Personnel security. j. Other security disciplines. (AFR 205- 16)
  • See Adp Security, Adp System Security, Automated Data Processing Security, Automated Information Systems Security, Automation Security, Classified Computer Security Program, Data Security, Information Security, Information System Security, And Operational Data Security.