tailieunhanh - CISSP: Certified Information Systems Security Professional Study Guide 2nd Edition phần 10

Một hệ thống khép kín là gì? A. Một hệ thống thiết kế xung quanh cuối cùng, hoặc đóng cửa, các tiêu chuẩn B. Một hệ thống bao gồm tiêu chuẩn công nghiệp Chấp nhận kết quả thử nghiệm để chứng minh hệ thống máy tính thực thi chính sách an ninh D | Glossary 601 companion virus A variation of the file infector virus. A companion virus is a self-contained executable file that escapes detection by using a filename similar to but slightly different from a legitimate operating system file. compartmented mode See compartmented security mode. compartmented mode workstations A computer system in which all users have the same clearance. The concept of need-to-know is used to control access to sensitive data and the system is able to process data from multiple sensitivity levels at the same time. compartmented security mode A security mode in which systems process two or more types of compartmented information. All system users must have an appropriate clearance to access all information processed by the system but do not necessarily have a need to know all of the information in the system. compensation access control A type of access control that provides various options to other existing controls to aid in the enforcement and support of a security policy. competent A distinction of evidence that means that the evidence must be obtained legally. Evidence that results from an illegal search would be inadmissible because it is not competent. compiled languages A computer language that is converted into machine language before distribution or execution. compliance checking The process by which it is ensured that all of the necessary and required elements of a security solution are properly deployed and functioning as expected. compliance testing Another common usage of auditing. Verification that a system complies with laws regulations baselines guidelines standards and policies is an important part of maintaining security in any environment. Component Object Model COM Microsoft s standard for the use of components within a process or between processes running on the same system. compromise If system security has been broken the system is considered compromised. computer architecture An engineering discipline concerned .

TỪ KHÓA LIÊN QUAN