Term
|
Definition
| Opportunity to make use of an information system(IS) resource. |
|
|
Term
|
Definition
| Limiting access to information system resources only to authorized users, programs, processes, or other systems. |
|
|
Term
| Access Control List (ACL) |
|
Definition
| Mechanism implementing discretionary and/or mandatory access control between subjects and objects. |
|
|
Term
|
Definition
| Security safeguard designed to detect and deny unauthorized access and permit authorized access in an IS. |
|
|
Term
|
Definition
| Hierarchical portion of the security level used to identify the sensitivity of IS data and the clearance or authorization of users. Access level, in conjunction with the nonhierarchical categories, forms the sensitivity label of an object. (See category.) |
|
|