.


:




:

































 

 

 

 





. . .. 3

. . 11

. . . .. 17

. . . . 45

. , . 63

. . . . . 83

. . . . 25 1997 . 97

. . - . - , . 101

.
.

30 1992 .

.

.

. .

( ) , , .

, .

1. () Access to information , , ,
2. () Security policy ,
3. Authorized access to information ,
4. () Unauthorized access to information , , . ,
5. ( ) Protection from unauthorized access
6. () Access subject ,
7. () Access object ,
8. Access matrix ,
9. Subject privilege
10. ( ) Security policy violator ,
11. ( ) Security policy violators model ( )
12. () Trusted computing base ,
13. () Security policy realization
14. Access identifier
15. Identification ()
16. Password , ()
17. Authentication ;
18. ( ) Trusted computer system ( ),
19. ( ) Protection facility , - ,
20. Protection model ( ) - ()
21. Information security , ,
22. Information integrity () ()
23. Sensitive information ,
24. Discretionary access control .
25. Mandatory access control , , , ()
26. Multilevel secure ,
27. Reference monitor concept , ,
28. ( ) Security kernel , ,
29. Security administrator ,
30. () Sensitivity label , ,
31. Verification
32. ( ) Protection class of computer systems ( )
33. ( ) Protection criterion of computer systems , , ,
34. () Secret information security system - ( )
35. ( ) System of protection from unauthorized access to information - ( )
36. () Cryptographic information protection facility ,
37. () Protection certificate , ()
38. () Protection level certification

( )

( )





:


: 2016-10-27; !; : 402 |


:

:

, ,
==> ...

1715 - | 1637 -


© 2015-2024 lektsii.org - -

: 0.017 .