-
1 критерии Оранжевой книги
Универсальный русско-английский словарь > критерии Оранжевой книги
-
2 критерии оценки средств защиты информации Министерства обороны США
Универсальный русско-английский словарь > критерии оценки средств защиты информации Министерства обороны США
-
3 Сист
General subject: Joint Capabilities Integration and Development System (JCIDS is the formal United States Department of Defense (DoD) procedure which defines acquisition requirements and evaluation criteria for future defense programs.)
См. также в других словарях:
Trusted Computer System Evaluation Criteria — (TCSEC) is a United States Government Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system. The TCSEC was used to evaluate, classify and… … Wikipedia
Department of Defense Whistleblower Program — Aircraft procurement whistleblowing launched the modern Defense whistleblower program. The Department of Defense Whistleblower Program enables, in part, the federal mission of protecting whistleblowers by committing the Inspector General of the U … Wikipedia
Common Criteria — The Common Criteria for Information Technology Security Evaluation (abbreviated as Common Criteria or CC) is an international standard (ISO/IEC 15408) for computer security certification. It is currently in version 3.1.[1] Common Criteria is a… … Wikipedia
Government procurement in the United States — is based on many of the same principles as commercial contracting, but is subject to special laws and regulation as described below. Persons entering into commercial contracts are pretty much free to do anything that they can agree on. Each… … Wikipedia
Government contract — Contracting with the U.S. Government is based on many of the same principles as commercial contracting andcan be very profitable, but is sufficiently different from commercial contracting to require special care.Persons entering into commercial… … Wikipedia
Reliability centered maintenance — Reliability Centered Maintenance, often known as RCM , is an industrial improvement approach focused on identifying and establishing the operational, maintenance, and capital improvement policies that will manage the risks of equipment failure… … Wikipedia
Mandatory access control — In computer security, mandatory access control (MAC) refers to a type of access control by which the operating system constrains the ability of a subject or initiator to access or generally perform some sort of operation on an object or target.… … Wikipedia
Rainbow Series — For the compact disc standards series, see Rainbow Books. The Rainbow Series (sometimes known as the Rainbow Books) is a series of computer security standards and guidelines published by the United States government in the 1980s and 1990s. They… … Wikipedia
Multilevel security — or Multiple Levels of Security (abbreviated as MLS) is the application of a computer system to process information with different sensitivities (i.e., at different security levels), permit simultaneous access by users with different security… … Wikipedia
Defense Information Systems Agency — Seal … Wikipedia
Covert channel — In computer security, a covert channel is a type of computer security attack that creates a capability to transfer information objects between processes that are not supposed to be allowed to communicate by the computer security policy. The term … Wikipedia