This is a glossary of ITServices terms and acronyms often used at Queen's, many of which are specific to Queen's. If you are looking for a particular term that is not listed, please complete the issue form and we'll do our best to add it to the list.
|AD||Active Directory is Microsoft's version of a Lightweight Directory Access Protocol (LDAP)-based network directory service. AD allows administrators to define, arrange and manage objects, such as user data, printers and servers, so they are available to users and applications throughout the organization.
||An Application is software developed for a particular purpose to provide some sort of academic or administrative benefit. Examples: a room scheduling application; a course discussion board application; a purchase order tracking application; a web survey and data collection tool.
||Authentication is the process of verifying the identify of a user seeking to access a computer, system or application. Typically, this is achieved with a username (such as a Queen's NetID) and a password, the latter being known only by the user associated with the username.
||Authenticode employs a process called code signing to certify that executable programs have not been altered or corrupted during deployment. Software developers use a unique key to "sign" the software they deploy and updates to that software over time.|
||Authorization is the process of determining the access permissions granted to a user of a system or application, and provisioning that user with the access or capabilities they are authorized to use. Increasingly, authorization and provisioning may be based on one or more roles that an individual may have within the organization (e.g. all "students" can access a system).|
|Business Intelligence Query is an enterprise-strength query and reporting application that helps users ask questions about corporate data and visualize the answers for more effective decision-making. BI Query is used to access the University's main administrative databases. Formerly known as GQL.|
|Campus Computer Sales & Service. Campus Computer Sales is located in Dupuis Hall, Room G25, and Campus Computer Service (microrepair computer depot) is located in the Lower Level of Stauffer Library.|
|Computing Sites||The computing sites around the Queen’s Campus include all of the computer labs and computer kiosks. Public sites are open to all members of the Queen’s community, while semi-public sites may have restrictions, such as being open only to members of certain faculties.|
|Critical Server||A Critical Server is one which stores or provides access to personal and/or confidential data, or a server on which important University or department applications, services or databases are housed.|
|DCRep||The Departmental Computing Representative (DCRep) program has been superseded by the ITAdmin Rep Program.|
||Degaussing is a process and a device which leaves the magnetic field representation of data on hard drives, floppy disks and magnetic tapes in random patterns, thereby rendering previous data unrecoverable. In most cases Degaussing renders the magnetic media completely unusable and damages the storage system. Degaussing and physical destruction are considered the only truly secure means of disposing of magnetic storage media and devices.|
|DTRep||Departmental Telecommunications Representative (DTRep) program has been superseded by the ITAdmin Rep Program.|
||Encryption is the process of transforming information in plain text using a logical method called an algorithm, such that the information is unreadable to anyone who does not have the means to decrypt or un-encrypt it, often called the key.|
||The Emerging Technology Centre functions as an evaluation, research and development unit for emerging technologies. It provides a showcase of multimedia resources for the Queen’s community, and it gathers together such technologies for experimentation. Its services are available to Queen’s faculty, staff, and students who would like to enhance their academic projects, and/or investigate opportunities for new technologies to increase the quality of teaching and learning.|
|FIPPA||FIPPA, or the Freedom of Information and Protection of Privacy Act, is Ontario legislation which was amended in 2005 to include Ontario Universities. This legislation requires organizations such as Queen's to take the necessary steps to safeguard the privacy of personal information pertaining to our employees and our students.|
|A Firewall is computer hardware and/or software which protects systems or applications "behind" the firewall from unauthorized external (outside the firewall) access. A firewall provides an added layer of protection to block access to entire system or application, or to non-approved system ports or services.|
|GQL||Graphical Query Language. See also BI Query.
|Hacker||A Hacker is an individual who gains or attempts to gain unauthorized or illegal access to a computer system or application. The term Hacker may also be used to refer to an individual who develops and/or distributes computer viruses, ot initiates denial of service attacks.|
|Hosted Web Application||A Hosted Web Application is a software application that provide some academic, administrative or other benefit but does not operate on a system or server within the Queen's IT infrastructure (central or departmental). Members of the Queen's community may use such applications that are hosted on servers external to the University. Also referred to as "Software as a Service".|
|HTML||HyperText Markup Language is the programming language used to create documents for display on the World Wide Web.|
|ITServices Desktop Assistant retrieves, installs, configures, and updates Windows applications in use at Queen's. Ida replaces Packman and runs on Windows XP, Vista and Windows 7.|
|IMAP||Internet Message Access Protocol. This successor of the POP protocol is used to retrieve email messages from a central email server. Email stored on an IMAP server can be accessed from more than one computer without the need to transfer messages or files back and forth between those computers.|
||Intrusive software is a surreptitious program which imbeds itself in other programs, is able to self-replicate, and seizes some level of control of a computer. Such programs are able to delete or modify data, change settings, and harvest sensitive data and internet usage history, among other malevolent actions. Also called "malware". Examples are software viruses, spyware, and trojan horses.|
|IP address||An IP address is the numeric location of a computer system or network on the Internet. Each system connected to the Internet must have a unique one of these to differentiate it from other systems.|
|The ITAdmin Rep program was created to form a partnership between Information Technology Services (ITServices) and all the departments of Queen's University to facilitate the sharing of computing information. ITAdmin reps serve as liaisons between their department and ITServices, assist other department members with basic computer use issues, coordinate the configuration of telephones, and the payment of service charges for telephones.|
|ITSC||The Queen’s Information Technology Support Centre is located in Stauffer Library (Room 119). Home to most of the ITServices technical support services, it is available to all staff, faculty and students of Queen’s.|
|ITSS||Information Technology Support Services. The sector of Queen’s ITServices that provides first- and second-level technical support for microcomputers and widely used systems and software such as email, web browsers, antivirus software, etc. Manages the public computing sites. Develops and maintains Ida (software for configuring Windows computers for the Queen's environment), and installing and configuring a variety of popular software. Provides departmental server administration and support. Negotiates and manages various site and volume license agreements for software used at the University. Provides ListServ mailing list service. Provides consulting and support for adaptive technology.|
|JAWS||JAWS (Job Access With Speech) for Windows (JFW) is the Windows screen reader supported by ITServices. Its affordable price, ability to work with all of the voice synthesizers and refreshable Braille displays available today, and its many supported Windows operating systems make it an attractive solution for people who are blind or visually impaired.|
|ListServ||ListServ is a way of reaching multiple email addresses quickly and easily. The program will send a message to a specified list of email addresses, which can easily be modified by the "owner" of the mailing list. ListServs can be set up for any staff or faculty member, as well as for some student organizations (for example, ASUS has been granted use of the Queen’s ListServ).|
|LiveUpdate||LiveUpdate is the Symantec technology that permits an installed Symantec product to connect to a Symantec server over the Internet to check for program and other updates such as virus definitions. When updates are available, LiveUpdate downloads them to your computer and installs them, keeping your Symantec software up to date. LiveUpdate must be run on a regular basis in order to keep your security services up to date. It can be installed through Ida, and, by default, will be set to run automatically.|
|Malware, or malicious software, is software designed to infiltrate or damage a computer system without the user's consent or knowledge. Malware includes viruses, worms, and trojan horses.The risks of a computer being infected with malware can range from merely reducing the overall performance of the computer to intercepting passwords, deletion of valuable data, and/or harvesting of sensitive information. Computers can be protected from malware infiltration using anti-virus utilities and firewalls.|
|Microrepair||The Queen’s computer repair depot. Desktops and laptops with problems that cannot be resolved at the ITSC or by phone can be checked in here for service by our certified technicians. This will take some time, and will almost definitely require the computer to be checked in for several days. Based out of CCSS in the Lower Level of Stauffer Library.|
|Moodle||Moodle is an open-source, password-protected learning management system. It can be used to deliver academic courses on the Web or to supplement face-to-face instruction. It can also be used for collaborative research and project-based group work.|
|MSM||Macintosh Software Manager. MSM is a package manager, similar to Packman, designed for Mac OS-based computers. MSM is used at Queen’s to configure modem settings for dial-up connections and network settings for Ethernet connections. MSM can be downloaded from this page.|
|MVS||Multiple Virtual Storage is IBM's operating system for large mainframe systems. It's now embracing the programming interfaces and standards of the UNIX environment.|
|NetID||You may know it as your UserID or log on. NetID is the UserID you need to sign on to the applications and services that are operated by ITServices such as email, Moodle, wireless internet and more. A NetID is the first part of a Queen’s email address. It is all of the letters and numbers before the @ sign.|
|Obfuscation||Obfuscation is the concealment of meaning in communication of information, making it confusing and more difficult to interpret. It is a process whereby information is encoded using some sort of encryption scheme to protect it during transmission.|
|Outlook Web App (OWA)||OWA is Microsoft's service for Staff and Faculty to access their email account on the web. Also referred to as QWA (Queen's Web App).|
|Packman (short for Package Manager) has been superseded by Ida.|
|Penetration Testing is a process used to probe the security of a system or application to determine if there are any security vulnerabilities which could be exploited by an attacker or stumbled upon by a person not authorized to access that system or application. Penetration testing often involves the use of the same tools an attacker might use to find "holes" in a system's security, but with improving rather than exploiting the system's security as a goal. Penetration testing usually yields a list of potential vulnerabilities and recommendations for how the associated risks might be mitigated.|
|PHIPA||PHIPA, or the Personal Health Information Protection Act, is Ontario Legislation which requires organizations such as Queen's to ensure that health information about individuals remains private.|
|POP||Post Office Protocol is a protocol used to retrieve email from a remote server over a TCP/IP connection.
|The individual recognized by the University as having lead responsibility for a research project or area. In the context of information security, the Principal Investigator has the same responsibilities as a Department Head, but typically on a smaller scale and/or with narrower scope.|
|A proxy server acts as a diversion between a local computer and a remote system that you are trying to connect to. If set up, all data will be sent through the proxy server on its way to or from the local computer. Queen’s uses a proxy server to allow users who are off campus to connect to Queen’s resources, such as Exambank and QCAT.|
|QLC||The Queen's Learning Commons is an inviting, collaborative learning space where people pursue and share ideas. Centrally located in Stauffer Library, this enriched learning environment brings together for the first time a comprehensive, integrated set of academic support services and resources for Queen's students. The QLC partners are the Library, ITServices, Learning Strategies Development, Library Services for Students with Disabilities, and the Writing Centre.|
|Queen's Web App (QWA)||QWA is Microsoft's service for Staff and Faculty to access their email account on the web. Also referred to as OWA (Outlook Web App).|
|Reimage||Reimaging is the process of formatting a drive and reinstalling the base software. This will include the operating system and any other software that was on the computer when it was first turned on. However, all documents and settings will be lost.|
|ResNet||ResNet is the Queen’s network in residence. It connects all of the computers in residence to each other and to the Internet. ResNet also allows all of the computers to be protected by the Queen’s firewall, while also giving the systems access to all of Queen’s online resources, such as Exambank and Moodle.|
|ResTel||ResTel is your residence telephone and telephone service. ITServices installs and maintains the ResTel infrastructure.
|RSS||Rich Site Summary is a technology that allows web users to receive (ongoing, constantly updated) information collected from many sources through a simple reader. This is supplied through an RSS feed that users can subscribe to.|
|SAV||Symantec AntiVirus is a real-time antivirus scanner used to stop viruses, Trojans and worms before they infect a computer, as well to remove infections from a computer that has been infected. SAV is licensed by Queen’s University and is distributed for free to all Queen’s students, faculty and staff through the Packman program. It is very important to note the SAV must be regularly updated using Symantec’s LiveUpdate program, which comes as a part of the antivirus software, and will update the virus definition files as well as the program, ensuring that it continues to work effectively.
NOTE: Symantec AntiVirus has been superseded by Symantec Endpoint Security for Windows users.
||Symantec Endpoint Security is a real-time antivirus scanner used to stop viruses, trojans and worms before they infect a computer, and removes infections from computers that have already been infected. SEP is licensed by Queen’s University and is distributed for free to all Queen’s students, faculty members and staff members through the Packman program. It is very important to note that SEP must be regularly updated using Symantec’s LiveUpdate program, which comes as a part of the antivirus software, to ensure that it continues to work effectively.|
|A Software Virus or Computer Virus is a program designed to install itself on a computer without the approval or knowledge of the person using that system, in order to disrupt the operation of the system, take control of it, or harvest what might be sensitive information stored on the system. In the realm of information technology, a virus is often used as a general term for more specific malevolent program more accurately classified as a trojan or worm. In some cases, a software virus will establish itself in one computer, and then attempt to proprogate (spread) to other computers, such as those in the same branch of a network, or by sending itself to everyone in the user's address book.|
|Queen's Student On-Line University System is the information system used at Queen’s for checking marks, registering for courses, ordering transcripts, checking the status of paid fees and many other services relating to academics and the University.|
|Spyware is computer software that is installed surreptitiously on a computer to intercept or take partial control over the user's interaction with the computer without the user's consent. Anti-Spyware utilities can be installed to detect the presence of Spyware or to prevent it from being installed on the computer.|
|SSL||SSL, or Secure Sockets Layer, are cryptographic protocols that provide security and data integrity for tranmission of information over the Internet, including passwords. Secure Sockets Layer protocols are being replaced by Transport Layer Security (TLS) protocols as the Internet evolves.|
||A System Assessment is a process which reviews the physical and electronic security of a system or application to identify potential risks to the security and integrity of the system and information stored on or accessed through that system. Many of the risks that these Electronic Information Security Guidelines are meant to address and mitigate are evaluated during a system assessment, which may involve penetration testing using tools which try to exploit common vulnerabilities.|
|The Transmission Control Protocol and Internet Protocol, which are also known as the Internet Protocol Suite, is the basic communication language of the Internet.|
|To log on to a UNIX server you will need to use a Telnet program. Telnet is a terminal emulation program for TCP/IP networks such as the Internet. The Telnet program runs on your computer and connects your PC to a server on the network. You can then enter commands through the Telnet program and they will be executed as if you were entering them directly on the server. Windows includes a Telnet program, and Packman distributes TeraTerm Pro.
Trojan (or Trojan Horse)
|A Trojan (or Trojan Horse) is a form of Malware which is purported to provide some benefit or desirable function, but secretly carries out malevolent or unauthorized actions such as opening up access to a system or information stored on it, or passing control of the system to an attacker or hacker. Trojans can come hidden in what are advertized to be computer games, electronic greeting cards, or even anti-virus software tools, and the user may unwittingly active the trojan merely by clicking on a link and agreeing to download an "important browser extension" or "software update".|
|TSM||Tivoli Storage Manager is a backup service provided by Queen's University ITServices. This service allows users to backup the disk drives on most workstations connected to the campus network. TSM is available through Packman.|
|UIS||University Information Systems. UIS manages network accessible services such as email, disk backup, World Wide Web, Domain Names; operates central administrative data processing and printing; plans and manages additions to campus network facilities.|
|User||An individual who, by virtue of their role(s) at the University, needs to access and use a defined range of systems, applications, and information to fulfil their duties or pursue their studies.|
|VPN||Virtual Private Network. A VPN is a form of communication over networks that are public in ownership, but emulate a private network in terms of security.|
|Webmail||Webmail is the system of accessing an email server through a web browser for Undergraduate students.
|Web Proxy||See Proxy Server.|
|WPA2||WPA2, or Wi-Fi Protected Access, is a certification protocol for securing information for transmission over wireless networks which employ that protocol. Information transmitted over open or unsecure wireless networks which do not use the WPA2 protocol is vulnerabe to eavesdropping by others using the wireless network, and thus should not be used to transmit passwords or access sensitive information.|