Перевод: с русского на все языки

со всех языков на русский

Department of DOD evaluation criteria

См. также в других словарях:

  • Trusted Computer System Evaluation Criteria — (TCSEC) is a United States Government Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system. The TCSEC was used to evaluate, classify and… …   Wikipedia

  • Department of Defense Whistleblower Program — Aircraft procurement whistleblowing launched the modern Defense whistleblower program. The Department of Defense Whistleblower Program enables, in part, the federal mission of protecting whistleblowers by committing the Inspector General of the U …   Wikipedia

  • Common Criteria — The Common Criteria for Information Technology Security Evaluation (abbreviated as Common Criteria or CC) is an international standard (ISO/IEC 15408) for computer security certification. It is currently in version 3.1.[1] Common Criteria is a… …   Wikipedia

  • Government procurement in the United States — is based on many of the same principles as commercial contracting, but is subject to special laws and regulation as described below. Persons entering into commercial contracts are pretty much free to do anything that they can agree on. Each… …   Wikipedia

  • Government contract — Contracting with the U.S. Government is based on many of the same principles as commercial contracting andcan be very profitable, but is sufficiently different from commercial contracting to require special care.Persons entering into commercial… …   Wikipedia

  • Reliability centered maintenance — Reliability Centered Maintenance, often known as RCM , is an industrial improvement approach focused on identifying and establishing the operational, maintenance, and capital improvement policies that will manage the risks of equipment failure… …   Wikipedia

  • Mandatory access control — In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.… …   Wikipedia

  • Rainbow Series — For the compact disc standards series, see Rainbow Books. The Rainbow Series (sometimes known as the Rainbow Books) is a series of computer security standards and guidelines published by the United States government in the 1980s and 1990s. They… …   Wikipedia

  • Multilevel security — or Multiple Levels of Security (abbreviated as MLS) is the application of a computer system to process information with different sensitivities (i.e., at different security levels), permit simultaneous access by users with different security… …   Wikipedia

  • Defense Information Systems Agency — Seal …   Wikipedia

  • Covert channel — In computer security, a covert channel is a type of computer security attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the computer security policy. The term …   Wikipedia

Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»