upload
Alliance for Telecommunications Industry Solutions
Branża: Telecommunications
Number of terms: 29235
Number of blossaries: 0
Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
In computer security, the authorization and approval--granted by a designated authority to a data processing system, computer network, organization, or individual--to process sensitive information or data. 2. Formal declaration by a designated approving authority that an information system (IS) is approved to operate in a particular security mode using a prescribed set of safeguards at an acceptable level of risk.
Industry:Telecommunications
In computer security, the purposeful combining of data or information from one data processing system with data or information from another system to derive protected information. Synonym fusion.
Industry:Telecommunications
In computer security, synonym for hot standby. See yystandby.
Industry:Telecommunications
In computer security, synonym flaw.
Industry:Telecommunications
In computer security, a type of operation specified by an access right. Note: Examples of access type are "read," "write," "execute," "append," "modify," "delete," and "create. " 2. The privilege to perform action on an object. Read, yywrite, execute, append modify, delete, and create are examples of access types.
Industry:Telecommunications
In computer security, a willful or negligent unauthorized activity that affects or involves the computer security of a data processing system. 2. In computer crime, the use of a computer to perform an illegal or unauthorized act. 3. Intentional or reckless misuse, alteration, disruption, or destruction of information processing resources.
Industry:Telecommunications
In computer security, a penetration technique in which different communication networks are used to gain access to a data processing system to avoid detection and trace-back. 2. A penetration technique in which different communication networks are linked to access an information system (IS) to avoid detection and trace-back.
Industry:Telecommunications
In computer security, a representation of one or more access rights that a possessor has to an object. Note: The ticket represents an access permission.
Industry:Telecommunications
In computer security, a functional unit that provides a security filter between two data processing systems operating at different security levels or between a user terminal and a database to filter out data that the user is not authorized to access.
Industry:Telecommunications
In computer science, the highest level of a hierarchy.
Industry:Telecommunications