Search2 Results

A Compromised Computer is defined as any computing resource whose confidentiality, integrity, or availability has been adversely impacted, either intentionally or unintentionally, by an untrusted source. A compromise can occur either through manual interaction by the untrusted source or through automation.
UTHSC ITS minimum hardware requirements for new computer purchases and recommended hardware lifecycle.