Краткий толковый словарь по информационной безопасности
© Copyright, 1998-2000, А.В. Лукацкий 170
У
У
к
к
а
а
з
з
а
а
т
т
е
е
л
л
ь
ь
5
5200.28-STD, 168
A
A Guide to Procurement of Trusted Systems
An Introduction to Procurement Initiators on Computer
Security Requirements, 90
Computer Security Contract Data Requirements List and
Data Item Description Tutorial, 90
How to Evaluate a Bidder’s Proposal Document – An
Aid to Procurement Initiators and Contractors, 90
Language for RFP Specifications and Statements of Work
– An Aid to Procurement Initiators, 90
A Guide to Understanding Audit in Trusted Systems, 87
A Guide to Understanding Configuration Management in
Trusted Systems, 88
A Guide to Understanding Covert Channel Analysis of
Trusted Systems, 92
A Guide to Understanding Data Remanence in Automated
Information Systems, 91
A Guide to Understanding Design Documentation in Trusted
Systems, 88
A Guide to Understanding Discretionary Access Control in
Trusted Systems, 88
A Guide to Understanding Identification and Authentication
in Trusted Systems, 89
A Guide to Understanding Information System Security
Officer Responsibilities for Automated Information
Systems, 91
A Guide to Understanding Object Reuse in Trusted Systems,
89
A Guide to Understanding Security Modeling in Trusted
Systems, 89
A Guide to Understanding Security testing and Test
Documentation in Trusted Systems, 90
A Guide to Understanding Trusted Distribution in Trusted
Systems, 88
A Guide to Understanding Trusted Facility Manuals, 89
A Guide to Understanding Trusted Recovery in Trusted
Systems, 89
A Guide to Writing the Security Features User’s Guide for
Trusted Systems, 91
Access control, 86
Access control list, 86
Access period, 86
Accessing Controlled Access Protection, 91
Accountability, 86
Adaptive chosen ciphertext attack, 87
Adjudicated protocol, 87
Advanced Encryption Standard, 92
AES, 92
Amber Book, 92
American National Standards Institute, 84
ANSI, 84
ANSI X12.58, 85
ANSI X9.17, 84
ANSI X9.23, 84
ANSI X9.30, 84
ANSI X9.31, 84
ANSI X9.41, 85
ANSI X9.42, 85
ANSI X9.44, 85
ANSI X9.45, 85
ANSI X9.9, 84
Application-level Gateway, 87
Aqua Book, 92
Arbitrated protocol, 87
AS2805.6.5.3, 87
ASSIST, 85
Assurance, 87
Asymmetric cryptography, 87
Audit, 86
Audit trail, 86
Authentication, 86
Authentication Header, 119
Authenticode, 85
Authorization, 87
Automated Systems Security Incident Support Team, 86
B
Backup plan, 93
Banking Circular 226, 93
Banking Circular 229, 93
Bastion Host, 95
BC-226, 93
BC-229, 93
Bell-LaPadulla model, 93
Birthday attack, 94
Blind signature scheme, 94
Block Cipher, 93
Blowfish, 93
Blue Book, 95
Bright Blue Book, 95
Bright Orange Book, 95
Brown Book, 95
Brute-force attack, 94
Brute-force search, 94
Burgundy Book, 95
C
C-36, 101
Capability, 99
CAPI, 101
Capstone, 97
CBC, 96
CERT, 97
Certificate, 101
Certificate Revocation List, 101
CFB, 96
Challenge-Handshake Authentication Protocol, 102
CHAP, 102
Chosen ciphertext attack, 100
Chosen key attack, 101
Chosen message attack, 100
Chosen plaintext attack, 100