Search2 Results

Start typing to lookup. Use the UP and DOWN arrow keys to review results. Press ENTER to select. Press BACKSPACE to remove a selection.
    Lookup Category Clear Category
    A Compromised Computer is defined as any computing resource whose confidentiality, integrity, or availability has been adversely impacted, either intentionally or unintentionally, by an untrusted source. A compromise can occur either through manual interaction by the untrusted source or through automation.
    UTHSC ITS minimum hardware requirements for new computer purchases and recommended hardware lifecycle.