A
Access Control: Measures that ensure only authorized users can access certain resources.
Authentication: The process of verifying the identity of a user or system.
Authorization: The process of determining what resources a user is permitted to access.
B
Batch User: An employee user account created in bulk with other employee users, processed in one transaction using the batch user feature.
C
Cipher: An algorithm for performing encryption or decryption.
Changing Passwords: The process of updating a user’s password to maintain security.
Core User: A primary user who has extensive access and responsibilities within the system, particularly to the HRplus core modules such as Personnel, Payroll, Benefits, etc.
D
Data Encryption: The process of converting plain text into a coded format to prevent unauthorized access.
E
Encryption Key: A piece of information, in a form of a string of characters, used by an encryption algorithm to transform plain text into ciphertext or vice versa.
F
Firewall: A network security system that monitors and controls incoming and outgoing network traffic.
G
Global ID: A unique identifier assigned to a user that can be used across multiple systems.
Grant/Revoke Company Access: The process of allowing or denying a user the ability to access company resources.
L
Login Activity: The tracking and monitoring of user login attempts and sessions.
M
Mail Server: A server that handles and delivers email over a network.
Mail Server IP Address: The specific IP address assigned to a mail server for communication purposes.
Malware: Malicious software designed to harm, exploit, or otherwise compromise a computer system.
Make Duplicate User IDs Unique: The process of ensuring each user ID within a system is distinct to prevent conflicts and ensure proper identification.
Module Audit: The process of reviewing and ensuring that a security module is functioning correctly and securely.
Multi-Factor Authentication (MFA): A security system that requires more than one method of authentication from independent categories of credentials.
N
New User: An individual who has recently been granted access to a system and has a newly created account.
P
Pay Group Access: Permissions granted to a user to access specific payroll groups within HRplus.
R
Restrict Position Access: Limiting a user's ability to view or interact with sensitive data, based on their job role or position within the organization.
Random Password: A system-generated password with a random sequence of characters, sent to batch users via email to ensure unique and secure initial access.
Reset Password: The process of changing a user’s password, typically when it is forgotten or compromised.
Restrict User Reports: The process of limiting a user’s ability to access certain reports within a specific HRplus module.
S
Self Service User: A user with permissions to manage their own information, such as viewing payslips, personal details, and password resets.
Single Sign-On (SSO): An authentication process that allows a user to access multiple applications with one set of login credentials.
Static Password: A password that is entered by the system administrator when creating batch users. The password is the same for all users, and two-factor authentication must be enabled when this option is being used.
T
Two-Factor Authentication (2FA): A method of confirming a user's claimed identity by utilizing a combination of two different factors: something they know, something they have, or something they are.
U
Unlink Employee Profile: The process of disconnecting an employee’s profile from a user account.
User Database: A central repository of user information, including personal details, job history, and access permissions.
User Group: A collection of users with similar access rights and permissions to the same module or module features within HRplus.
User ID: A unique identifier assigned to a user for accessing a system.
User ID Protocol: The guidelines and rules for creating and managing user IDs within a system.
User Signature: A digital representation of a user's signature used for authentication and authorization.
V
Virtual Private Network (VPN): A service that encrypts your internet traffic and protects your online identity by hiding your IP address.
Vulnerability: A weakness in a system or its design that could be exploited by a threat to gain unauthorized access to or perform unauthorized actions on a computer system.
0 Comments
Add your comment