Print this Page
1.5 HRM
01. Glossary of Terms
Close this Page

Initials:
AP Additional Premium: amount charged to the client by way of additional premium.
MGA Managing General Agent: a wholesale insurance intermediary with the authority to accept placements from appointed brokers and retail agents on behalf of an insurer. Will provide underwriting and administrative services on behalf of insurers where specialist expertise is required that is not always available within the insurance company.
NCB No Claim Bonus.
PDO Physical Damage Only insurance when applied to hull and machinery.
SI Sum Insured: the amount of risk involved in a policy.
SIR Self-Insured Retention: please see Deductible.
TPL Third Party Liability: as an additional optional insurance sold in conjunction with marine insurance.
WRO War Risk Only.

Computing Glossary:
HTML Hypertext Markup Language as the primary language of all web pages. See Javacript and CSS.
CSS Cascade Style Sheet is a HTML extension method for reusable web page color schemes.
Javescript is a HTML extension language used with some web pages.
AJAX Asynchronous Javascrip and XML is a Javascript technique used with some web pages.
Cookie is a small file stored on client computers to enable sessions to retain context when navigating between web pages.
System Administrator duties include installing, supporting and maintaining servers or other computer systems and planning for and responding to service outages and other problems (copied from www.Wikipedia.org).
IAS Internet Application Service that may be used by authorized users in any location using any computer (or smart phone) without any specially installed software.
ASP Application Service Provider.

Glossary:
Agent and/or Agent is a company or person authorized by an Owner to enter client asset details for a quotation and and other reasons.
Termination or Expiry date and time of policy as insurance contract.
Site means any authorized office or branch or department that has users, including head office.
User means a person who has been authorized to sign in and use certain application facilities.

 
Terminology:
Asset is an insurable risk owned by a client such as a vessel, vehicle or property.
Bordereau or statement is a report providing premium or loss data with respect to specific risks - periodically provided by a reinsurer to ceding insurers.
Ceding company will cede all or part of the insurance or reinsurance to a reinsurer - liabilities are reinsured with another.
Client is the (prospective) policy holder as the insured person or company - may become a claimant.
Deductible is an excess charge withheld from any claim made by a policy holder - the amount of any claim that is not paid to the client.
Excess Charge please see Deductible.
Exposure Base is a basis to which rates are applied to determine premium using measurable factors such as size, weight, value.
Login please see Sign In.
Policy is the written contract of insurance between the insurer and the policy holder (client) that consists of a declaration, policy coverage (what is insured) and endorsements (terms and conditions).
Premium is the amount paid by a client to a broker in a settlement currency in consideration of an insurance policy.
Rate is a unit of cost that is multipled by an exposure base factor to determine an insurance premium.
Risk the client asset to which an insurance policy relates.
Self-Insured Retention (SIR) please see Deductible.
Sign In is the secure authentication (identification) of a unique person that was called login before the Internet arrived.
Sum Insured is the limit of insured risk as the total value of all insured assets.
Third Party Liability is optional additional insurance cover that may be included on a policy.

Tools:
www.irmi.com/online/insurance-glossary

PenTest
A penetration test, occasionally pentest, is a method of evaluating the security of a computer system or network by simulating an attack from a malicious source, known as a Black Hat Hacker, or Cracker.   The process involves an active analysis of the system for any potential vulnerabilities that could result from poor or improper system configuration, both known and unknown hardware or software flaws, and operational weaknesses in process or technical countermeasures.   This analysis is carried out from the position of a potential attacker and can involve active exploitation of security vulnerabilities.   Any security issues that are found will be presented to the system owner, together with an assessment of their impact, and often with a proposal for mitigation or a technical solution.   The intent of a penetration test is to determine the feasibility of an attack and the amount of business impact of a successful exploit.

ISMS
An Information Security Management System (ISMS) is a set of policies concerned with information security management or IT related risks.   These ideas arose primarily out of ISO 27001 and ISO 27002.   The governing principle behind an ISMS is that an organization should design, implement and maintain a coherent set of policies, processes and systems to manage risks to its information assets, thus ensuring acceptable levels of information security risk.
ISO/IEC 27002 is an information security standard published by the International Organization for Standardization (ISO) and by the International Electrotechnical Commission (IEC), entitled Information technology - Security techniques - Code of practice for information security management.   ISO/IEC 27002 provides best practice recommendations on information security management for use by those responsible for initiating, implementing or maintaining Information Security Management Systems (ISMS).
Information security is defined within the standard in the context of:
* the preservation of confidentiality (ensuring that information is accessible only to those authorised to have access),
* integrity (safeguarding the accuracy and completeness of information and processing methods) and
* availability (ensuring that authorised users have access to information and associated assets when required).

ITIL
The Information Technology Infrastructure Library (ITIL) is an Information Technology (IT) management framework that provides practices for Information Technology Services Management (ITSM), IT development and IT operations.   ITIL gives detailed descriptions of a number of important IT practices and provides comprehensive checklists, tasks and procedures that any IT organization can tailor to its needs.   ITIL is published in a series of books, each of which covers an IT management topic.

PRINCE2
PRojects IN Controlled Environments 2 (PRINCE2) is a structured project management method endorsed by the UK government as the project management standard for public projects.   The methodology encompasses the management, control and organization of a project.   PRINCE2 is also used to refer to the training and accreditation of authorised practitioners of the methodology who must undertake accredited qualifications to obtain certification.

Data Center
A Data Center (or data center or datacenter or datacenter) is a facility used to house computer systems and associated components, such as telecommunications and storage systems.   It generally includes redundant or backup power supplies, redundant data communications connections, environmental controls including air conditioning and fire suppression.   A modern Tier-4 data center provides many layers of physical security to host mission critical Internet backbone services.
Our Data Center IV hosts 30,000 servers with 250 Gigabit connectivity, standby generators, UPS battery power and 250 recording CCTV cameras monitored 24/7.

CHF
A Cryptographic Hash Function (CHF) is a deterministic procedure that takes an arbitrary block of data and returns a fixed-size bit string; the cryptographic hash value, such that an accidental or intentional change to the data will change the hash value.   When applicable, the URL is protected with a CHF that will identify if the URL is changed in any way.   Cryptographic hash functions have many information security applications, notably in digital signatures, message authentication codes, and other forms of authentication.   CHF examples include MD5, SHA and AES.   CHF works in a very effective way as the same program with a private key creates the URL to be sent and validates the URL when it is received.

URL
URL means Universal Resource Locator and is the string of characters shown in your browsers address bar that look like:
    /index.c2?c2=home
The URL is the primary method that a criminal would use to attack an Internet application.