HP ProBook 4525s HP ProtectTools User Guide - Windows XP, Windows Vista, Windo - Page 96

Glossary, authorized user - bios locked

Page 96 highlights

Glossary activation The task that must be completed before any of the Drive Encryption features are accessible. Drive Encryption is activated using the HP ProtectTools Setup Wizard. Only an administrator can activate Drive Encryption. The activation process consists of activating the software, encrypting the drive, creating a user account, and creating the initial backup encryption key on a removable storage device. administrator See Windows administrator. asset A data component consisting of personal information or files, historical and Web-related data, and so on, which is located on the hard drive. ATM Automatic Technology Manager, which allows network administrators to manage systems remotely at the BIOS level. authentication Process of verifying whether a user is authorized to perform a task such as accessing a computer, modifying settings for a particular program, or viewing secured data. authorized user A user who has been granted permission on the User Access Settings view to view or modify configuration settings on the Simple Configuration or Device Class Configuration views. automatic shredding Scheduled shredding that the user sets in File Sanitizer. back up Using the backup feature to save a copy of important program information to a location outside the program. It can then be used for restoring the information at a later date to the same computer or another one. background service The HP ProtectTools Device Locking/Auditing background service, which must be running for device access control policies to be applied. It can be viewed from within the Services application under the Administrative Tools option in the Control Panel. If it is not running, the HP ProtectTools Security Manager attempts to start it when device access control policies are applied. biometric Category of authentication credentials that use a physical feature, such as a fingerprint, to identify a user. certification authority Service that issues the certificates required to run a public key infrastructure. chat history session An encrypted file that contains a record of both sides of a conversation in a chat session. console A central location where you can access and manage the features and settings in HP ProtectTools Administrative Console. credentials Method by which a user proves eligibility for a particular task in the authentication process. cryptographic service provider (CSP) Provider or library of cryptographic algorithms that can be used in a well-defined interface to perform particular cryptographic functions. cryptography Practice of encrypting and decrypting data so that it can be decoded only by specific individuals. 88 Glossary

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103

Glossary
activation
The task that must be completed before any of the Drive Encryption features are accessible. Drive
Encryption is activated using the HP ProtectTools Setup Wizard. Only an administrator can activate Drive
Encryption. The activation process consists of activating the software, encrypting the drive, creating a user account,
and creating the initial backup encryption key on a removable storage device.
administrator
See
Windows administrator.
asset
A data component consisting of personal information or files, historical and Web-related data, and so on,
which is located on the hard drive.
ATM
Automatic Technology Manager, which allows network administrators to manage systems remotely at the
BIOS level.
authentication
Process of verifying whether a user is authorized to perform a task such as accessing a
computer, modifying settings for a particular program, or viewing secured data.
authorized user
A user who has been granted permission on the User Access Settings view to view or modify
configuration settings on the Simple Configuration or Device Class Configuration views.
automatic shredding
Scheduled shredding that the user sets in File Sanitizer.
back up
Using the backup feature to save a copy of important program information to a location outside the
program. It can then be used for restoring the information at a later date to the same computer or another one.
background service
The HP ProtectTools Device Locking/Auditing background service, which must be running
for device access control policies to be applied. It can be viewed from within the Services application under the
Administrative Tools option in the Control Panel. If it is not running, the HP ProtectTools Security Manager attempts
to start it when device access control policies are applied.
biometric
Category of authentication credentials that use a physical feature, such as a fingerprint, to identify a
user.
certification authority
Service that issues the certificates required to run a public key infrastructure.
chat history session
An encrypted file that contains a record of both sides of a conversation in a chat session.
console
A central location where you can access and manage the features and settings in HP ProtectTools
Administrative Console.
credentials
Method by which a user proves eligibility for a particular task in the authentication process.
cryptographic service provider (CSP)
Provider or library of cryptographic algorithms that can be used in a
well-defined interface to perform particular cryptographic functions.
cryptography
Practice of encrypting and decrypting data so that it can be decoded only by specific individuals.
88
Glossary