.


:




:

































 

 

 

 


.




 

 

:

-15

..

:

..

 

 

1.

 

2.

 

3. ,

 

4.

 

5.

 

, , - . , , , . , - : , ..

, . - , , .

, - , .

, . , , . , .

. - , , .

, .

, , .

.

, () () .

- .

, .

.

.

.

() .

() .

. , .

, . .

(Accesstoinformation) - , , , , .

(Securitypolicy) - , .

(Authorizedaccesstoinformation) - , .

(Unauthorizedaccesstoinformation) - , , .

(Protectionfromunauthorizedaccess) - .

(Accesssubject) - , .

(Accessobject) - , .

(Accessmatrix) - , .

(Subjectprivilege) - .

(Securitypolicyviolator) - , .

(Securitypolicyviolater'smodel) - ( ) .

(Trustedcomputingbase) - , .

(Securitypolicyrealization) - .

(Accessidentifier) - .

(Identification) - () .

(Password) - , () .

(Authentication) - , .

(Trustedcomputersystem) - ( ), .

(Protectionfacility) - , - , .

(Protectionmodel) - ( ) - / .

(Informationsecurity) - p, p p .

( Informationintegrity) - () ().

(Sensitiveinformation) - , .

(Discretionaryaccesscontrol) - . .

(Mandatoryaccesscontrol) - , , , () .

(Multilevelsecure) - , .

(Referencemonitorconcept) - , , .

(Securitykernel) - , , ; .

(Securityadministrator) - , .

(Sensitivitylabel) - , , .

(Verification) - .

(Protectionclassofcomputersystems) - ( ) .

(Protectioncriterionofcomputersystems) - , , , .

(Secretinformationsecuritysystem) - - ( ) .

(Systemofprotectionfromunauthorizedaccesstoinformation) - - ( ) .

(Cryptographicinformationprotectionfacility) - , .

(Protectioncertificate) - , / .

( Protectionlevelcertification) - .





:


: 2016-12-04; !; : 1066 |


:

:

, .
==> ...

1020 - | 838 -


© 2015-2024 lektsii.org - -

: 0.019 .