Integrated California State University Administrative Manual

Policy Glossary G - I

A B C D E F G H I J K L M N O P Q R S T U V-Z

Hardening
A defensive strategy to protect against attacks by removing vulnerable and unnecessary services, patching security holes, and securing access controls.

Hardware
Physical devices including, but is not limited to, portable and non-portable workstations, laptops, servers, copiers, printers, faxes, and PDAs.

Information Assets
Information systems, data, and network resources to include automated files and databases.

Information Security Program
An organizational effort that includes, but is not limited: to security policies, standards, procedures, and guidelines plus administrative, physical, and technical controls. The effort may be implemented in either a centralized or a decentralized manner.

Information Systems
A combination of hardware, network and other resources that are used to support applications and/or to process, transmit and store data

Integrity
Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.  [44 U.S.C., SEC. 3542]

A B C D E F G H I J K L M N O P Q R S T U V-Z