:
-15
..
:
..
1.
2.
3. ,
4.
5.
, , - . , , , . , - : , ..
, . - , , .
, - , .
, . , , . , .
. - , , .
, .
, , .
.
|
|
, () () .
- .
, .
.
.
.
() .
() .
. , .
, . .
(Accesstoinformation) - , , , , .
(Securitypolicy) - , .
(Authorizedaccesstoinformation) - , .
(Unauthorizedaccesstoinformation) - , , .
(Protectionfromunauthorizedaccess) - .
(Accesssubject) - , .
(Accessobject) - , .
(Accessmatrix) - , .
(Subjectprivilege) - .
(Securitypolicyviolator) - , .
(Securitypolicyviolater'smodel) - ( ) .
(Trustedcomputingbase) - , .
(Securitypolicyrealization) - .
(Accessidentifier) - .
|
|
(Identification) - () .
(Password) - , () .
(Authentication) - , .
(Trustedcomputersystem) - ( ), .
(Protectionfacility) - , - , .
(Protectionmodel) - ( ) - / .
(Informationsecurity) - p, p p .
( Informationintegrity) - () ().
(Sensitiveinformation) - , .
(Discretionaryaccesscontrol) - . .
(Mandatoryaccesscontrol) - , , , () .
(Multilevelsecure) - , .
(Referencemonitorconcept) - , , .
(Securitykernel) - , , ; .
(Securityadministrator) - , .
(Sensitivitylabel) - , , .
(Verification) - .
(Protectionclassofcomputersystems) - ( ) .
(Protectioncriterionofcomputersystems) - , , , .
(Secretinformationsecuritysystem) - - ( ) .
(Systemofprotectionfromunauthorizedaccesstoinformation) - - ( ) .
|
|
(Cryptographicinformationprotectionfacility) - , .
(Protectioncertificate) - , / .
( Protectionlevelcertification) - .