.


:




:

































 

 

 

 





4.1.1 ; (computer system) - , .

4.1.2 ; (automated system) - , ᒺ , , , .

4.1.3 ; (computer system, target of evaluation) - , .

4.1.4 (information security policy) , , , , , .

4.1.5 (threat) - 䳿, / .

4.1.6 (information security) , - .

4.1.7 (information protection, information security, computer system security) , , , .

4.1.8 ; Dz , - , .

4.1.9 ; (trusted computing base; TCB) - , .

4.1.10 ; (trusted computer system, trusted computer product) , .

4.1.11 ᒺ ; ᒺ (product object, system object) , .

4.1.12 ᒺ (passive object) ᒺ , , / .

4.1.13 ᒺ- (process object) , ( , , ..).

4.1.14 (user) , .

4.1.15 ᒺ- (user object) , (, , . .).

4.1.16 ᒺ (object identifier) ᒺ , ᒺ .

4.1.17 (information flow) ᒺ .

4.1.18 (access to information) 䳿 ᒺ , ᒺ / .

4.1.19 ; (access mediation rules) , ᒺ.

4.1.20 (access type) ᒺ, 䳿, : 䳿, , (, , , , , ).

4.1.21 (access request) ᒺ .

4.1.22 (authorized access to information) , .

4.1.23 ; (unauthorized access to information) , .

4.1.24 ; (protection from unauthorized access) .

4.1.25 (access right) .

4.1.26 (privilege) , ᒺ.

4.1.27 (access control) , .

4.1.28 (access mediation) , .

4.1.29 (authorization) ; ( ᒺ) ( ).

4.1.30 (authorized user) , 䳺 .

4.1.31 (user role) , , .

4.1.32 (administrator, administrative user) , / .

4.1.33 (security administrator) , .

4.1.34 (user violator) , .

4.2.1 (disclosure) , ᒺ.

4.2.2 (modification) , ᒺ.

4.2.3 (sensitive information) , ; - , (, ) , - () .

4.2.4 (information confidentiality) , , / .

4.2.5. ֳ (information integrity) , , / .

4.2.6 ֳ (system integrity) , , , .

4.2.7 (availability) (, , ᒺ , ), , / , 䳺 , , , () , , , , , , .

4.2.8 (accountability) , , ᒺ, / 䳿.

4.2.9 (attack) .

4.2.10 (penetration) .

4.2.11 (system vulnerability) .

4.2.12 (compromise) ; .

4.2.13 (information leakage) , .

4.2.14 (covert channel) , , , .

4.2.15 (storage covert channel) , .

4.2.16 (timing covert channel) , (, ), .

4.2.17 (covert channel bandwidth) , .

4.2.18 ³ (fault, failure) .

4.2.19 ³ (denial of service) - , - () ; ( ) - .

4.2.20 (repudiation) ᒺ 䳿, .

4.2.21 ³ (repudiation of origin) - .

4.2.22 ³ (repudiation of receipt) - .

4.2.23 (computer virus) , 䳺 , , 䳿, / .

4.2.24 (program bug) , / .

4.2.25 (trap door) , .

4.2.26 (Trojan horse) , , , , 䳿 .

4.2.27 , ᒺ, , , .





:


: 2016-09-06; !; : 371 |


:

:

, .
==> ...

1792 - | 1541 -


© 2015-2024 lektsii.org - -

: 0.011 .