DOCUMENT
Information Assurance
152 definitions by The United States Army

AccessAccess ControlAccountabilityAccreditation DecisionAdjunct NetworkApproval to operateArmy informationAuditAudit TrailAuthenticateAuthenticationAuthorization to operateAuto-Manual SystemAutomated Tactical SystemAvailabilityCategoryCentral computer facilityCertificationCertification and accreditationCertification AuthorityCertification EventCertification SupportClassified defense informationClearingCommercial Communications Security Endorsement ProgramCompromising EmanationsComputerComputer FacilityComputer SecurityConfidentialityConfiguration ControlConfiguration ManagementContingency PlanControlled Access ProtectionControlled Cryptographic ItemCountermeasureCryptographicCryptographic EquipmentCryptographyData SecurityDatoDefense in DepthDegaussDemilitarized ZoneDenial of ServiceDesignated Approving AuthorityDigital SignatureDiscretionary Access ControlEavesdroppingEmbedded CryptographyEmission SecurityEnclaveExtranetFile serverFirewallFly Away C&A packageForeign Exchange PersonnelForeign Liaison OfficersForeign OfficialForeign Ownership, ControlFormal Access ApprovalInformation AssuranceInformation Assurance-Enabled ProductInformation Assurance ProductInformation Dissemination ManagementInformation OwnerInformation System Security IncidentInformation System Serious IncidentInformation TechnologyInstallation Campus Area NetworkIntegrityIntelligence InformationInterconnected Accredited Information System ViewInterim Authority To OperateInterim Authority To TestIntranetKeyLeast PrivilegeLimited Privileged AccessLocal Area NetworkMachine CryptosystemMainframeMalicious Software CodeManual CryptosystemMilitary Information EnvironmentMission Assurance CategoryMonitoringMultilevel ModeMultilevel securityNational Security SystemNeed-to-KnowNet-CentricityNetworkNetwork ManagementNetwork OperationsNetwork SecurityNetworthinessNon-Communications EmitterNon-Privileged AccessOperations SecurityOutsourced IT-based ProcessPasswordPersonal Digital AssistantPersonal Electronic DevicesPersonal E-mail AccountPlatform Information Technology InterconnectionPrinciple of Least PrivilegePrivileged AccessProtected Distribution SystemProxy ServerPurgeRemote Access ServerRemote Authentication Dial-In User ServiceRemote TerminalRiskRisk AssessmentSecurity GuardSecurity Test and EvaluationSensitive But UnclassifiedSensitive InformationSocial EngineeringSpamStand-Alone Information SystemSurvivabilitySusceptibilitySystemSystem AdministratorSystem AuditSystem of SystemsSystem OwnerTelecommunicationsTelecommunications and Information Systems SecurityTelecommunications SystemTELNETTerminalTerminal Access Controller Access SystemThreatThreat AgentThreat AnalystTime Bomb And Logic BombTrapdoorTrivial File Transfer ProtocolTrojan HorseUserUser IDVirtual Private NetworkVirusVulnerabilityVulnerability AssessmentWide Area NetworkWorld Wide WebWorm
Loading conversations.
Date
2007-10-24
Related Entities