All > Technology > Defense

All > Technology > Defense

All > Technology > Defense

All > Technology > E-mail > Lotus Domino

All > Technology > Search > Enterprise Search

All > Technology > Telecommunications

All > Technology > Telecommunications

Also listed in:

All > Technology > Telecommunications

All > Technology > Telecommunications

All > Technology > Telecommunications

All > Technology > Telecommunications

All > Technology > Telecommunications

All > Technology > Telecommunications

All > Technology > Telecommunications

All > Technology > Telecommunications

All > Technology > E-mail > Microsoft Email > Microsoft Exchange > Microsoft Exchange 2007

All > Technology > Telecommunications

All > Technology > Records Management

All > Technology > Security

All > Technology > Telecommunications

  • 1. The ability and means necessary to store data in, to retrieve data from, to communicate with, or to make use of any resource of a system. 2. To obtain the use of a resource. 3. (COMSEC) [The] capability and opportunity to gain detailed knowledge of or to alter information or material. [NIS] 4. (AIS) [The] ability and means to communicate with (i.e., input to or receive output from), or otherwise make use of any information, resource, or component in an AIS. Note [for 3 and 4]: An individual does not have "access" if the proper authority or a physical, technical, or procedural measure prevents him/her from obtaining knowledge or having an opportunity to alter information, material, resources, or components. [NIS] 5. An assigned portion of system resources for one data stream of user communications or signaling. 6. [An] opportunity to make use of an information-system (IS) resource. [INFOSEC-99] 7. Condition where the potential exists for information to flow between entities [CESG]. 8. A specific type of interaction between a subject and an object that results in the flow of information from one to the other [CESG]. 9 A specific type of interaction between a subject and an object that results in the flow of information from one to the other. Possible information flows include the transfer of attributes pertaining to that object, the transfer of data pertaining to that object, or the fact of existence of that object [POSIX.6]. 10. A specific type of interaction between a subject and an object that results in the flow of information from one to the other [TCSEC].

  • Browse Related Terms: access, attention character, controlled sharing, flaw hypothesis methodology, protection-critical portion of the TCB, reference validation mechanism, security kernel, security relevant event, sensitivity label, surrogate access, tag, TEMPEST, Trusted Path, trusted software

All > Technology > Telecommunications

All > Technology > Telecommunications

ExpertGlossary.com