Technology Glossary

The Technology Glossary provides a definition of several terms used by Information Technology. The Glossary of Library Terms contains definitions specific to library services.

Academic Computing Policy Committee and Working Group The Academic Computing Policy Committee Working Group (ACPCWG) discusses, evaluates, prioritizes, and recommends to the Provost, CIO, and IT Governance Committee, policies, standards, and guidelines for the use of academic technologies and library/computing resources used to support all areas of teaching, learning, and research at WPI. The committee may consider exploration of current and future academic and technology practices, processes, solutions, technologies, lab equipment, digital repositories, hardware and software to stimulate more creativity for research and innovation with educational technology.
Acceptable Use Policy http://www.wpi.edu/Pubs/Policies/AUP/
ACPCWG Refers to the Academic Computing Policy and Working Group
Administrative Systems Working Group The Administrative Systems Working Group (ASWG) creates initiatives documents, investigates scope and requirements, makes recommendations and provides detailed materials for the Governance Working Group. Membership is composed of representatives from the business units whose operations rely on Banner, WPIís ERP system.
ASWG Refers to the Administrative Systems Working Group
AUP Acceptable Use Policy
Business Continuity Institute (BCI) The BCI promotes the highest standards of professional competence and commercial ethics in the provision, maintenance and services for Business Continuity Management (BCM).
Classified Refers to information that is subject to special security classification regulations imposed by many national governments. This might include but is not limited to transportation security, military-related research.
Confidential Employee Information This refers to personal employee information that is privileged only on a need-to-know basis. This includes but is not limited to home address and home phone number, information not otherwise available that is identified by the sender as personal or confidential.
Critical System A system storing sensitive information or is critical to normal daily operations.
Data Access Working Group The Data Access Working Group (DAWG) addresses policies, standards, and procedures that determines who has access to specific Banner (ERP) data and how that data may be used.
Data Stewardship Working Group The Data Stewardship Working Group (DSWG) makes recommendations on key functional and technical components of strategy for managing the institutionís data Ė e.g., data access, privacy, security and use, data sharing, data integration, data warehousing, information architecture, data quality, data standards and metadata management. It supports select data-driven initiatives, such as Operational Data Store (ODS) / Enterprise Data Warehouse (EDW). It reviews and comments on database upgrades, making recommendations on appropriate scheduling times and facilitate user testing prior to upgrade installation. It reviews proposed changes to validation tables and analyze the use of a proper channel i.e. Helpdesk ticket, initiative, etc.
DAWG Refers to the Data Access Working Group
Disaster Recovery Institute (DRI) DRI International was founded in 1988 in order to develop a base of knowledge in contingency planning and the management of risk, a rapidly growing profession. Today, DRI International administers the industry's premier educational and certification programs for those engaged in the practice of business continuity planning and management.
DSWG Refers to the Data Stewardship Working Group
FERPA Federal Family Educational Rights & Privacy Act. Refer to the FERPA Compliance Statement.
Governance Working Group The Governance Working Group (GWG) is the guiding body for the appropriate business use and direction of WPIís ERP system, SunGardís Banner. The GWG establishes priorities for Banner-related projects and provides oversight for Banner-related policies and standards. Membership includes the president, vice presidents, and the chair of the faculty Committee on IT Policy.
GWG Refers to the Governance Working Group
Kerberos Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography. For additional information, see http://web.mit.edu/Kerberos/.
ISCP Information Security Compliance Program
Information Security Office The Information Security Office is a virtual office of the IT staff who respond to a potential or actual information security breach. The office is managed by the Assistant Vice President for Information Security and Networking. Managed and supported by the Information Technology
IT-supported Managed and supported by the Information Technology
Legislation Refers to United States government legal acts, which are outlined on the WPI page, Federal and State Legislation.
Limited access office Academic department offices, private faculty offices, offices in which a limited number of personnel work.
Locked, limited access room Locked rooms with access limited to specific WPI personnel assigned to those offices.
MAC Address Media Access Control (MAC)
Machine Any device that stores or processes data.
National Institute of Standards and Technology Founded in 1901, NIST is a non-regulatory federal agency within the U.S. Commerce Department's Technology Administration. NIST's mission is to promote U.S. innovation and industrial competitiveness by advancing measurement science, standards and technology in ways that enhance economic security and improve our quality of life.
Network Security Policy http://www.wpi.edu/Pubs/Policies/netsec.html
NSP Network Security Policy
Personal machine A machine not owned or operated by WPI not owned by someone affiliated with WPI. Example: A student's personal computer or a staff member's home computer.
Public Information Any public information, such as general institutional information, and selected personnel and technical information. This excludes FERPA-protected information as defined by the Registrar's Office.
Restricted information Information that is protected by legal privacy acts, contracts, and/or information designated by WPI. Federal legislation includes, but is not limited to, Copyright, Federal Family Educational Rights & Privacy Act (FERPA), and the Health Insurance Portability and Accountability Act (HIPAA).
SAN Storage area network
SANS SANS (SysAdmin, Audit, Network, Security) is the most trusted and by far the largest source for information security training and certification in the world. It also develops, maintains and makes available at no cost, the largest collection of research documents about various aspects of information security. Also, it operates the Internet's early warning system - Internet Storm Center. The SANS Institute was established in 1989 as a cooperative research and education organization.
Sensitive Information Information that is considered WPI confidential information, governmentally regulated information, WPI intellectual property, information covered under any executed non-disclosure agreement and WPI community personally identifiable information.
Server A device used as a central point to store or process data for more than one user.
SPI Stateful Packet Inspection.; A class of network firewalls.
SSID Service Set IDentifier. The name that a wireless network advertises itself as.
Student Directory Information As defined in the FERPA Compliance Statement.
System Any device that stores or processes data. Machine & System are the same.
Systems Administrator A systems administrator is a member of the university community who is responsible for system and network support of computing resources in a local, departmental or enterprise environment. This could be a single person or a shared responsibility among several individuals. The title of this person varies by department. The systems administrator acts as the primary contact person in case of a security event.
User authentication A method by which the user of a wireless system can be verified as a legitimate user independent of the computer or operating system being used.
WEP Wired Equivalence Privacy. An old standard for wireless encryption which is no longer considered secure.
Wireless Client Any device that connects to a wireless device, such as a laptop or PDA.
Workstation Any device used to perform one's role at WPI directly. Example: A laptop used for work or a staff member's desktop PC.
WPA Wifi Protected Access. A secure standard for wireless encryption.
WPI Confidential Business Information Confidential business information refers to information as identified by WPI whose disclosure may harm WPI. In practice, it may include, but is not limited to, commercial or financial information that are privileged only on a need-to-know basis, sales and marketing plans, business information identified as confidential.

References

The following websites provide additional security definitions.

Revision History

Maintained by itweb
Last modified: Aug 12, 2011, 08:38 EDT
[WPI] [IT] [Back]