upload
Alliance for Telecommunications Industry Solutions
Domeniu: Telecommunications
Number of terms: 29235
Number of blossaries: 0
Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
1. Of information, the process of determining and designating the specific degree of protection against disclosure the information requires. 2. The level (degree) of protection so determined. Note: Examples of security classifications are: "top secret," "secret," and "confidential. " 3. Synonym security label.
Industry:Telecommunications
1. Of data processing operations, an independent review and examination of system records and activities to (a) determine the adequacy of system controls, (b) ensure compliance with established security policy and operational procedures, (c) detect breaches in security, and (d) recommend any indicated changes in any of the foregoing. 2. An independent review and examination of system records and activities in order to test for adequacy of system controls, to ensure compliance with established policy and operational procedures, to detect breaches in security, and to recommend any indicated changes in control, policy and procedures.
Industry:Telecommunications
1. Of classified or sensitive data, the degree to which the data have not been compromised; i.e., have not been made available or disclosed to unauthorized individuals, processes, or other entities. 2. Assurance that information is not disclosed to unauthorized persons, processes, or devices. 3. A property by which information relating to an entity or party is not made available or disclosed to unauthorized individuals, entities, or processes. 3. The prevention of the unauthorized disclosure of information. 4. A security property of an object that prevents:- its existence being known and/or- its content being known. This property is relative to some subject population and to some agreed degree of security. 5. Assurance that information is not disclosed to inappropriate entities or processes. 6. The property that information is not made available or disclosed to unauthorized individuals, entities, or processes. 7. The prevention of the unauthorized disclosure of information. 8. The property that the existence of an object and/or its contents is not made available or disclosed to unauthorized subjects.
Industry:Telecommunications
1. Of an electronic device, the extent to which it will operate at its designed performance level in its intended operational environment (including the presence of interference) without causing interference to other devices. 2. The degree to which an electrical or electronic device or devices operating on or responding to a specified frequency or frequencies is capable of functioning with other such devices.
Industry:Telecommunications
1. Of an antenna, the gain in a specified direction, i.e., azimuth, usually that of maximum gain, compared to the gain in a direction 180° from the specified azimuth. Note: Front-to-back ratio is usually expressed in dB. 2. A ratio of parameters used to characterize rectifiers or other devices, in which electrical current, signal strength, resistance, or other parameters, in one direction is compared with that in the opposite direction.
Industry:Telecommunications
1. Of a periodic signal, pertaining to transmission in which the time interval separating any two corresponding transitions is equal to the unit interval or to a multiple of the unit interval. 2. Pertaining to data transmission in which corresponding significant instants of two or more sequential signals have a constant phase relationship. Note: "Isochronous" and "anisochronous" are characteristics, while "synchronous" and "asynchronous" are relationships.
Industry:Telecommunications
1. Of a data or information processing system, a threat of disclosure of information without changing the state of the system. Note: An example of a passive threat is one that could result in the recovery of sensitive information through the unauthorized interception of a data transmission. 2. The threat of unauthorized disclosure of information without changing the state of the system.
Industry:Telecommunications
1. Member of an Evaluation Facility assigned to a particular evaluation. 2. The independent person or organization that performs an evaluation.
Industry:Telecommunications
1. Measures and controls taken to deny unauthorized persons information derived from telecommunications and to ensure the authenticity of such telecommunications. Note: Communications security includes cryptosecurity, transmission security, emission security, and physical security of COMSEC material. • (a) cryptosecurity: The component of communications security that results from the provision of technically sound cryptosystems and their proper use. • (b) emission security: Protection resulting from all measures taken to deny unauthorized persons information of value which might be derived from intercept and analysis of compromising emanations from crypto-equipment, AIS, and telecommunications systems. • (c) physical security: The component of communications security that results from all physical measures necessary to safeguard classified equipment, material, and documents from access thereto or observation thereof by unauthorized persons. • (d) transmission security: The component of communications security that results from the application of measures designed to protect transmissions from interception and exploitation by means other than cryptanalysis. 2. Measures to ensure the confidentiality and integrity of information in telecommunications systems and channels. See also: Electronic Information Systems Security.
Industry:Telecommunications
1. Intelligible data, the semantic content of which is available. 2. Synonym plain text.
Industry:Telecommunications