- Industria: Telecommunications
- Number of terms: 29235
- Number of blossaries: 0
- Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
1. Set of records that collectively provide documentary evidence of processing used to aid in tracing from original transactions forward to related records and reports, and/or backwards from records and reports to their component source transactions. . 2. Data collected and potentially used to facilitate a security audit.
Industry:Telecommunications
1. See signal compression. 2. In video production, the imposition of a nonlinear transfer function on (i.e., the nonlinear processing of, to reduce the dynamic range of) signal amplitude values (e. G. , as in gamma correction. )
Industry:Telecommunications
1. See risk analysis. 2. The process of analyzing threats to and vulnerabilities of an information system (IS) and the potential impact the loss of information or capabilities of a system would have on national security. The resulting analysis is used as a basis for identifying appropriate and cost-effective countermeasures. 3. The process of reviewing the threats to and vulnerabilities of a system to determine the level of risk to which it is exposed. See also: Minimum Standards.
Industry:Telecommunications
1. See firewall. 2. An Application acting on behalf of another application or system in responding to protocol requests. 3. An entity in a system that acts on behalf of another entity in invoking some operation.
Industry:Telecommunications
1. See aliasing. 2. In networking, one of a set of domain names of an Internet resource. 3. Synonyms personal number, UPT number.
Industry:Telecommunications
1. Security testing in which evaluators attempt to circumvent the security features of a system based on their understanding of the system design and implementation. 2. Tests performed by an evaluator on the Target of Evaluation in order to confirm whether or not known vulnerabilities are actually exploitable in practice. 3. The portion of security testing in which the penetrators attempt to circumvent the security features of a system. The penetrators may be assumed to use all system design and implementation documentation, which may include listings of system source code, manuals, and circuit diagrams. The penetrators work under no constraints other than those that would be applied to ordinary users.
Industry:Telecommunications
1. Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information. 2. A security measure designed to protect a communications system against acceptance of a fraudulent transmission or simulation by establishing the validity of a transmission, message, or originator. 3. Evidence by proper signature or seal that a document is genuine and official. 4. The verification of a claimed identity. Example: By the use of a password. 5. The process by which the identity of an entity is established. 6. See data origin authentication, and peer entity authentication. Note: In this part of 7498 the term "authentication" is not used in connection with data integrity; the term "data integrity" is used instead. The property of knowing that the data received is the same as the data that was sent, and that the claimed sender is in fact the actual sender.
Industry:Telecommunications
1. Residual information remaining on storage media after clearing. 2. The persistence of information on computing or communications media or equipment even following a purge. Note: Normally used to refer to residual information which would only be accessible using specialist techniques. Example: magnetic remanence. See also: Object Reuse, Purge.
Industry:Telecommunications
1. Representation of facts, concepts, or instructions in a formalized manner suitable for communication, interpretation, or processing by humans or by automatic means. Any representations such as characters or analog quantities to which meaning is or might be assigned. 2. Representations of facts, concepts or instructions in a formalized manner suitable for communication, interpretation or processing by human and/or automatic means. Note: The interpretation of data as information requires a convention (e.g. Language. ) 3. Information with a specific physical representation.
Industry:Telecommunications
1. Reassignment and re-use of a storage medium containing one or more objects after ensuring no residual data remains on the storage medium. 2. Reuse of a storage medium for a different object. Note: A vulnerability may exist if the medium contains residual data from a previous object. This is now the accepted term, despite the fact that it is the storage medium, not the object, that is reused. See also: Purge. 3. The reassignment to some subject of a medium (e.g., page frame, disk sector, magnetic tape) that contained one or more objects. To be securely reassigned, such media must contain no residual data from the previously contained object (s. )
Industry:Telecommunications