Activity Insight Management (A.I.M.) is the online reporting system used by the University of Wisconsin-Parkside to document the teaching, research, and service activities performed by its faculty members.
Contact: John Standard
Measures taken to protect computers or critical infrastructure.
Denial‐of‐service attack (DOS)
Flooding the networks or servers of individuals or organizations with false data requests so they are unable to respond to requests from legitimate users.
FERPA (Family Educational Rights & Privacy Act)
Take the FERPA Tutorial:
A person with special expertise in computer systems and software. A hacker who attempts to gain unauthorized access to computer systems is a "cracker."
An individual who breaches Web sites or secured communications systems to deliver political messages, including those related to foreign policy, or propaganda.
A method of validating a person`s identity when he/she tries to access a network.
Malicious code (also malware)
Any code that can be used to attack a computer by spreading viruses, crashing networks, gathering intelligence, corrupting data, distributing misinformation and interfering with normal operations.
The act of sending an e‐mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. The e‐mail directs the user to visit a website where they are asked to update personal information, such as passwords and credit card, social security, and bank account numbers that the legitimate organization already has. The Web site, however, is bogus and set up only to steal the user's information.
A fraudulent practice of sending purporting to be from reputable companies in order to induce individuals to give up personal information such as passwords, credit cards, addresses, account numbers, social security numbers, etc.
A form of malicious software that encrypts the victim's data and then demands a ransom payment in return for the key needed to decrypt the data. Few, if any, ransomware attackers are known to have actually provided a decryption key to victims who paid the ransom.
Unsolicited bulk e‐mail that may contain malicious software. Spam is now said to account for around 81 percent of all e‐mail traffic.
A type of phishing attack that focuses on a single user or department within an organization, addressed from someone within the company in a position of trust and requesting information such as login IDs and passwords. Spear phishing scams will often appear to be from a company's own human resources or technical support divisions and may ask employees to update their username and passwords. Once hackers get this data, they can gain entry into secured networks. Another type of spear phishing attack will ask users to click on a link, which deploys spyware that can thieve data
Making a message or transaction appear to come from a source other than the originator. Spyware ‐ Software that collects information without a user`s knowledge and transfers it to a third party. Trojan horse ‐ A destructive program that masquerades as a benign application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.
TAM is used by Human Resources and benefits the search committee by including features which allow staff to approve job postings, manage applicant materials, monitor applicant statuses through the search process, schedule interviews and review interview calendars, and forward applicants to other members of the search team for review. Additional information about TAM can be found on the Recruitment page of the Human Resources web site: https://www.uwp.edu/explore/offices/humanresources/recruitment.cfm If you have questions regarding the search and screen process or TAM, please contact Human Resources at (262) 595-2204 or via e-mail at: firstname.lastname@example.org.
A program designed to degrade service, cause inexplicable symptoms or damage networks.
Program or algorithm that replicates itself over a computer network and usually performs malicious actions, such as using up the computer's resources and possibly shutting the system down. A worm, unlike a virus has the capability to travel without human action and does not need to be attached to another file or program.