About | HeinOnline Law Journal Library | HeinOnline Law Journal Library | HeinOnline

130989 1 (1986-01-01)

handle is hein.gao/gaobacvwi0001 and id is 1 raw text is: 






INSIDE:                                                             71-01-60
   Everything you've  always  wanted
   to know  about DP  ...




                                                           130989





 Glossary of EDP Terminology

 Frederick  Gallegos



 PAYOFF IDEA. Half the battle in understanding the intricacies of data
 processing  is understanding  its terminology  and   the words  and  phrases
 specific to EDP  that have  evolved over  the years. This glossary  offers the
 reader a good working   base of these terms.


 acceptance  testing The formal testing conducted to determine whether a sc ware
   system satisfies its acceptance criteria, enabling the customer to determine whether
   to accept the system.
 access The  ability and the means necessary to approach, store, or retrieve data, or
   communicate  with or make use of any resource of a computer information system.
 access  category  An  authorization classification that defines the resources in a
   computer-based system to which a user, program, or process is granted access.
 access  control The process of allowing only authorized users, programs, or other
   computer systems (i.e., networks) to access the resources of a computer system.
 access control mechanisms   Hardware, software, or firmware features and operating
   and management  procedures in various combinations designed to detect and pre-
   vent unauthorized access and to permit authorized access to a computer system.
 access  list A catalog of users, programs, or processes and the specifications of the
   access categories to which each is assigned.
 access  period A segment  of time, generally expressed on a daily or weekly basis,
   during which access rights prevail.
 access type The  nature of access granted to a particular device, program, or file; for
   example, read, write, execute, append, modify, delete, create.
 accountability The quality or state that enables attempted and committed violations
   of computer systems security to be traced to individuals who may then be held
   responsible.
 accumulator  An area of storage in memory used to develop totals of units or items
   being computed.
 active wire-tapping The attachment of an unauthorized device, such as a computer
   terminal, to a communications circuit to gain access to data by generating false mes-
   sages or control signals or by altering the communications of legitimate users.
 Ada  A programming  language that allows use of structured techniques for program
   design; concise but powerful language designed to fill government requirements for
   real-time applications.
 add-on  security The retrofitting of protection mechanisms, implemented by hard-
   ware, firmware and/or software, on a computer system that has become operational.
 administrative security  The  management   constraints, operational procedures,
   accountability procedures, and supplemental controls established to provide an
   acceptable level of protection for sensitive data.


 @ 1986 Auerbach  Publishers Inc                                 EDP  Auditing

What Is HeinOnline?

HeinOnline is a subscription-based resource containing thousands of academic and legal journals from inception; complete coverage of government documents such as U.S. Statutes at Large, U.S. Code, Federal Register, Code of Federal Regulations, U.S. Reports, and much more. Documents are image-based, fully searchable PDFs with the authority of print combined with the accessibility of a user-friendly and powerful database. For more information, request a quote or trial for your organization below.



Contact us for annual subscription options:

Already a HeinOnline Subscriber?

profiles profiles most