.


:




:

































 

 

 

 





 

().

:

() [4] - () .

 

.

( ) [4] - , () .

 

1. , , [8]

\
1. () Access to information , , ,
2. () Security policy ,
3. Authorized access to information ,
4. () Unauthorized access to information , , : ,
5. ( ) Protection from unauthorized access
6. () Access subject ,
7. () Access object ,
8. Subject privilege
9. ( ) Security policy violator ,
10. ( ) Security policy violators model ( )
11. () Trusted computing base ,
12. () Security policy realization
13. Access identifier
14. Identification ()
15. Password , ()
16. Authentication ;
17. ( ) Trusted computer system ( ),
18. ( ) Protection facility , - ,
19. Protection model ( ) - ()
20. Multilevel security ,
21. , Protection class of computer systems ( )
22. () Cryptographic information protection facility ,

 





:


: 2016-10-06; !; : 940 |


:

:

,
==> ...

960 - | 873 -


© 2015-2024 lektsii.org - -

: 0.011 .