Compaq 8000 HP ProtectTools Guide - Page 73

Trusted Platform Module TPM embedded security chip., Public Key Infrastructure PKI

Page 73 highlights

Public Key Infrastructure (PKI) Standard that defines the interfaces for creating, using, and administering certificates and cryptographic keys. reboot. Process of restarting the computer. reveal. A task that allows the user to decrypt one or more chat history sessions, displaying the Contact Screen Name(s) in plain text and making the session available for viewing. revocation password. A password that is created when a user requests a digital certificate. The password is required when the user wants to revoke his or her digital certificate. This ensures that only the user may revoke the certificate. seal for trusted contacts. A task that adds a digital signature, encrypts the e-mail, and sends it after you authenticate using your chosen security logon method. security logon method. The method used to log in to the computer. Send Security button. A software button that is displayed on the toolbar of Microsoft Outlook e-mail messages. Clicking the button allows you to sign and/or encrypt a Microsoft Outlook e-mail message. shred cycle. The number of times the shred algorithm is executed on each asset. The higher the number of shred cycles you select, the more secure the computer is. shred profile. A specified erasure method and list of assets. shred. The execution of an algorithm that obscures the data contained in an asset. Sign and Encrypt button. A software button that is displayed on the toolbar of Microsoft Office applications. Clicking the button allows you to sign, encrypt, or removing encryption in a Microsoft Office document. signature line. A placeholder for the visual display of a digital signature. When a document is signed, the signer's name and verification method are displayed. The signing date and the signer's title can also be included. simple delete. Deletion of the Windows reference to an asset. The asset content remains on the hard drive until obscuring data is written over it by free space bleaching. smart card. Small piece of hardware, similar in size and shape to a credit card, which stores identifying information about the owner. Used to authenticate the owner to a computer. suggested signer. A user who is designated by the owner of a Microsoft Word or Microsoft Excel document to add a signature line to the document. Trusted Contact invitation. An e-mail that is sent to a person, asking them to become a Trusted Contact. Trusted Contact list. A listing of Trusted Contacts. Trusted Contact recipient. A person who receives an invitation to become a Trusted Contact. Trusted Contact. A person who has accepted a Trusted Contact invitation. trusted IM communication. A communication session during which trusted messages are sent from a trusted sender to a Trusted Contact. trusted message. A communication session during which trusted messages are sent from a trusted sender to a Trusted Contact. Trusted Platform Module (TPM) embedded security chip. The generic term for the HP ProtectTools Embedded Security Chip. A TPM authenticates a computer, rather than a user, by storing information specific to the host system, such as encryption keys, digital certificates, and passwords. A TPM minimizes the risk that information on the computer will be compromised by physical theft or an attack by an external hacker. ENWW Glossary 65

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77

Public Key Infrastructure (PKI)
Standard that defines the interfaces for creating, using, and administering
certificates and cryptographic keys.
reboot.
Process of restarting the computer.
reveal.
A task that allows the user to decrypt one or more chat history sessions, displaying the Contact Screen
Name(s) in plain text and making the session available for viewing.
revocation password.
A password that is created when a user requests a digital certificate. The password is
required when the user wants to revoke his or her digital certificate. This ensures that only the user may revoke
the certificate.
seal for trusted contacts.
A task that adds a digital signature, encrypts the e-mail, and sends it after you
authenticate using your chosen security logon method.
security logon method.
The method used to log in to the computer.
Send Security button.
A software button that is displayed on the toolbar of Microsoft Outlook e-mail messages.
Clicking the button allows you to sign and/or encrypt a Microsoft Outlook e-mail message.
shred cycle.
The number of times the shred algorithm is executed on each asset. The higher the number of
shred cycles you select, the more secure the computer is.
shred profile.
A specified erasure method and list of assets.
shred.
The execution of an algorithm that obscures the data contained in an asset.
Sign and Encrypt button.
A software button that is displayed on the toolbar of Microsoft Office applications.
Clicking the button allows you to sign, encrypt, or removing encryption in a Microsoft Office document.
signature line.
A placeholder for the visual display of a digital signature. When a document is signed, the signer's
name and verification method are displayed. The signing date and the signer's title can also be included.
simple delete.
Deletion of the Windows reference to an asset. The asset content remains on the hard drive until
obscuring data is written over it by free space bleaching.
smart card.
Small piece of hardware, similar in size and shape to a credit card, which stores identifying
information about the owner. Used to authenticate the owner to a computer.
suggested signer.
A user who is designated by the owner of a Microsoft Word or Microsoft Excel document to
add a signature line to the document.
Trusted Contact invitation.
An e-mail that is sent to a person, asking them to become a Trusted Contact.
Trusted Contact list.
A listing of Trusted Contacts.
Trusted Contact recipient.
A person who receives an invitation to become a Trusted Contact.
Trusted Contact.
A person who has accepted a Trusted Contact invitation.
trusted IM communication.
A communication session during which trusted messages are sent from a trusted
sender to a Trusted Contact.
trusted message.
A communication session during which trusted messages are sent from a trusted sender to
a Trusted Contact.
Trusted Platform Module (TPM) embedded security chip.
The generic term for the HP ProtectTools
Embedded Security Chip. A TPM authenticates a computer, rather than a user, by storing information specific to
the host system, such as encryption keys, digital certificates, and passwords. A TPM minimizes the risk that
information on the computer will be compromised by physical theft or an attack by an external hacker.
ENWW
Glossary
65