upload
Alliance for Telecommunications Industry Solutions
Domeniu: Telecommunications
Number of terms: 29235
Number of blossaries: 0
Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
1. A marking applied to information, indicating the estimated damage to the national interest that would be caused by its unauthorized disclosure, and used to determine the minimum standards of protection that should be applied. 2. A component of a security clearance and/or security class used for computing access rights and controlling information flow. Note: Access rights are granted when the classification element of the security clearance is greater than or equal to that of the security class. See also: Category, Caveat, and Dominance.
Industry:Telecommunications
1. A manual one-time cryptosystem produced in pad form. 2. The one time pad is the ONLY encryption scheme that can be proven to be absolutely unbreakable! It is used extensively by spies because it doesn't require any hardware to implement and because of its absolute security. This algorithm requires the generation of many sets of matching encryption keys pads. Each pad consists of a number of random key characters. These key characters are chosen completely at random using some truly random process. They are NOT generated by any kind of cryptographic key generator. Each party involved receives matching sets of pads. Each key character in the pad is used to encrypt one and only one plain text character, then the key character is never used again. Any violation of these conditions negates the perfect security available in the one time pad. So why don't we use the one time pad all the time? The answer is that the number of random key pads that need to be generated must be at least equal to the volume of plain text messages to be encrypted, and the fact that these key pads must somehow be exchanged ahead of time. This becomes totally impractical in modern high speed communications systems.
Industry:Telecommunications
1. A land station in the land mobile service. 2. In personal communication service, the common name for all the radio equipment located at one fixed location, and that is used for serving one or several cells.
Industry:Telecommunications
1. A key that is intended for use by a limited number of correspondents for encryption and decryption. 2. In a symmetric cryptographic algorithm the key shared between two entities. 3. In a symmetric encipherment algorithm the key shared between two entities.
Industry:Telecommunications
1. A host computer that, in a screened subnetwork, performs the functions of a firewall. Synonym screened-host gateway. 2. A computer system that must be highly secured because it is vulnerable to attack, usually because it is exposed to the Internet and is a main point of contact for users of internal networks. It gets its name from the highly fortified projects on the outer walls of medieval castles.
Industry:Telecommunications
1. A housing, screen, sheath, or cover that substantially reduces the coupling of electric, magnetic, or electromagnetic fields into or out of circuits or transmission lines. 2. A protective cover that prevents the accidental contact of objects or persons with parts or components operating at hazardous voltage levels.
Industry:Telecommunications
1. A host computer that, in a screened subnetwork, performs the functions of a firewall. Synonym screened-host gateway. 2. A computer system that must be highly secured because it is vulnerable to attack, usually because it is exposed to the Internet and is a main point of contact for users of internal networks. It gets its name from the highly fortified projects on the outer walls of medieval castles.
Industry:Telecommunications
1. A connection between initiating and terminating nodes of a circuit. 2. A single path provided by a transmission medium via either (a) physical separation, such as by multipair cable or (b) electrical separation, such as by frequency- or time-division multiplexing. 3. A path for conveying electrical or electromagnetic signals, usually distinguished from other parallel paths. 4. Used in conjunction with a predetermined letter, number, or codeword to reference a specific radio frequency. 5. The portion of a storage medium, such as a track or a band, that is accessible to a given reading or writing station or head. 6. In a communications system, the part that connects a data source to a data sink. 7. A virtual area where Internet Relay Chat (IRC) users communicate (exchanging text messages) in real time. Note: There are thousands of channels located on the Internet. 8. An IRC conduit designated for the real-time exchange of text messages. 9. An electrical path suitable for the transmission of communications between two or more points, ordinarily between two or more stations or between channel terminations in Telecommunication Company central offices. A channel may be furnished by wire, fiber optics, radio or a combination thereof. 10. The portion of the electromagnetic spectrum assigned by the FCC for one emission. In certain circumstances, however, more than one emission may be transmitted on a channel. 11. An information transfer path. 12. An information transfer path within a system. May also refer to the mechanism by which the path is effected. 13. An information transfer path within a system. May also refer to the mechanism by which the path is effected.
Industry:Telecommunications
1. A high-capacity disk storage device or a computer that each computer on a network can use or access and retrieve files that can be shared among attached computers. 2. A program, running on a computer, that allows different programs, running on other computers, to access the files of that computer.
Industry:Telecommunications
1. A hidden software or hardware mechanism, usually created for testing and troubleshooting, that may be used to circumvent computer security. 2. A hidden software or hardware mechanism that permits system protection mechanisms to be circumvented. It is activated in some non-apparent manner (e.g., special "random" key sequence at a terminal. )
Industry:Telecommunications