Âûäåðæêè èç ïðîèçâåäåíèÿ. Â ïîëíîì îáúåìå â àðõèâå
ôîðìàò pdf
© Copyright, 1998-2000, À.Â. Ëóêàöêèé 4
ÎÃËÀÂËÅÍÈÅ
À 23
ÀÒÀÊÀ 23
ÀÓÒÅÍÒÈÔÈÊÀÖÈß 23
ÀÓÒÅÍÒÈÔÈÊÀÖÈß ÎÄÍÎÑÒÎÐÎÍÍßß 23
ÀÓÒÅÍÒÈÔÈÊÀÖÈß ÂÇÀÈÌÍÀß 23
ÀÓÒÅÍÒÈÔÈÊÀÖÈß ÑËÀÁÀß 23
ÀÓÒÅÍÒÈÔÈÊÀÖÈß ÑÈËÜÍÀß 23
ÀÂÒÎÐÈÇÀÖÈß 23
ÀÂÒÎÐÈÇÎÂÀÍÍÛÉ ÑÓÁÚÅÊÒ ÄÎÑÒÓÏÀ 24
ÀÒÒÅÑÒÀÖÈß 24
ÀÒÒÅÑÒÀÖÈß ÈÑÏÛÒÀÒÅËÜÍÛÕ ËÀÁÎÐÀÒÎÐÈÉ 24
ÀÒÒÅÑÒÀÖÈß ÎÁÚÅÊÒÀ Â ÇÀÙÈÙÅÍÍÎÌ ÈÑÏÎËÍÅÍÈÈ 24
ÀÍÀËÈÇ ÇÀÙÈÙÅÍÍÎÑÒÈ 24
ÀÍÀËÈÇ ÐÈÑÊÀ 25
ÀÏÏÀÐÀÒÍÎÅ ÑÐÅÄÑÒÂÎ ÇÀÙÈÒÛ 25
ÀÍÒÈÂÈÐÓÑÍÀß ÏÐÎÃÐÀÌÌÀ 25
ÀÒÐÈÁÓÒ ÄÎÑÒÓÏÀ 25
ÀÓÄÈÒ 25
ÀÂÒÎÌÀÒÈÇÈÐÎÂÀÍÍÀß ÑÈÑÒÅÌÀ ÎÁÐÀÁÎÒÊÈ ÈÍÔÎÐÌÀÖÈÈ 25
ÀÄÌÈÍÈÑÒÐÀÒÎÐ ÁÅÇÎÏÀÑÍÎÑÒÈ 26
ÀÄÌÈÍÈÑÒÐÀÒÈÂÍÛÅ ÌÅÐÛ ÇÀÙÈÒÛ ÈÍÔÎÐÌÀÖÈÈ 26
ÀÏÏÀÐÀÒÍÎ-ÏÐÎÃÐÀÌÌÍÛÅ ÌÅÐÛ ÇÀÙÈÒÛ ÈÍÔÎÐÌÀÖÈÈ 26
ÀÁÎÍÅÍÒÑÊÎÅ ØÈÔÐÎÂÀÍÈÅ 26
ÀÊÊÐÅÄÈÒÀÖÈß 26
ÀÍÀËÈÇ ÒÐÀÔÈÊÀ 26
ÀÃÅÍÒÑÒÂÎ ÍÀÖÈÎÍÀËÜÍÎÉ ÁÅÇÎÏÀÑÍÎÑÒÈ 26
Á 27
ÁÅÇÎÏÀÑÍÎÑÒÜ ÈÍÔÎÐÌÀÖÈÈ 27
ÁÅÇÎÏÀÑÍÎÑÒÜ ÑÓÁÚÅÊÒÎÂ ÈÍÔÎÐÌÀÖÈÎÍÍÛÕ ÎÒÍÎØÅÍÈÉ 27
ÁÅÇÎÏÀÑÍÎÑÒÜ ÀÑ 27
ÁÅÇÎÏÀÑÍÎÑÒÜ ÐÅÑÓÐÑÀ ÀÑ 27
ÁÅÇÎÏÀÑÍÎÑÒÜ ÈÍÔÎÐÌÀÖÈÎÍÍÎÉ ÒÅÕÍÎËÎÃÈÈ 27
ÁÐÀÍÄÌÀÓÝÐ 28
ÁÎÌÁÀ ËÎÃÈ×ÅÑÊÀß 28
ÁÎÌÁÀ ÂÐÅÌÅÍÍÀß 28
ÁËÎ×ÍÛÉ ØÈÔÐ 28
ÁÅËËÀ-ËÀÏÀÄÓËËÀ ÌÎÄÅËÜ 28
ÁÜÞÔÎÐÒÀ ÊÂÀÄÐÀÒ 29
ÁÅÑÑÏÎÐÍÀß ÏÎÄÏÈÑÜ 29
ÁÀÑÒÈÎÍ 29
 30
ÂÅÐÈÔÈÊÀÖÈß 30
ÂÅÐÈÔÈÊÀÒÎÐ ÁÀÉÒ-ÊÎÄÀ 30
Êðàòêèé òîëêîâûé ñëîâàðü ïî èíôîðìàöèîííîé áåçîïàñíîñòè
© Copyright, 1998-2000, À.Â. Ëóêàöêèé 5
ÂÈÐÓÑ 30
ÂÎÑÑÒÀÍÎÂÈÒÅËÜÍÛÅ ÏÐÎÖÅÄÓÐÛ 30
ÂÈÆÈÍÅÐÀ ÊÂÀÄÐÀÒ 30
ÂÅÐÎßÒÍÎÑÒÍÎÅ ØÈÔÐÎÂÀÍÈÅ 30
ÂËÀÄÅËÅÖ ÈÍÔÎÐÌÀÖÈÈ 31
à 32
ÃÎÑÓÄÀÐÑÒÂÅÍÍÀß ÒÅÕÍÈ×ÅÑÊÀß ÊÎÌÈÑÑÈß ÏÐÈ ÏÐÅÇÈÄÅÍÒÅ ÐÔ 32
ÃÎÑÒÅÕÊÎÌÈÑÑÈß ÐÔ 32
ÃÒÊ ÐÔ 32
ÃÎÑÒ 28147-89 32
ÃÎÑÒ Ð 34.10-94 32
ÃÎÑÒ Ð 34.11-94 33
ÃÎÑÒ Ð 50739-95 33
ÃÎÑÒ Ð 50922-96 33
ÃÐÈÔ 33
ÃÀÌÌÀ ØÈÔÐÀ 33
ÃÀÌÌÈÐÎÂÀÍÈÅ 34
ÃÀÐÀÍÒÈÈ 34
ÃÅÍÅÐÀÒÎÐ ÊËÞ×ÅÂÎÃÎ ÏÎÒÎÊÀ 34
ÃÐÓÏÏÎÂÀß ÏÎÄÏÈÑÜ 34
ÃÅÍÅÐÀÖÈß ÊËÞ×ÅÉ 34
Ä 35
ÄÎÑÒÎÂÅÐÍÎÑÒÜ ÈÍÔÎÐÌÀÖÈÈ 35
ÄÎÑÒÓÏÍÎÑÒÜ ÑÈÑÒÅÌÛ 35
ÄÎÑÒÓÏ 35
ÄÎÑÒÓÏ Ê ÐÅÑÓÐÑÓ 35
ÄÈÑÊÐÅÖÈÎÍÍÛÉ ÄÎÑÒÓÏ 35
ÄÈÔÔÈ-ÕÅËËÌÀÍÀ ÀËÃÎÐÈÒÌ 35
ÄÎÑÒÎÂÅÐÍÀß ÂÛ×ÈÑËÈÒÅËÜÍÀß ÁÀÇÀ 36
ÄÂÁ 36
ÄÎÌÅÍ 36
ÄÎÑÒÎÂÅÐÍÛÉ ÌÀÐØÐÓÒ 36
ÄÆÅÔÔÅÐÑÎÍÀ ÊÎËÅÑÎ 36
ÄÎÑÊÀ ÏÎËÈÁÈß 37
ÄÅÊÎÄÈÐÎÂÀÍÈÅ 37
ÄÅÐÅÂÎ ÌÅÐÊËß 37
ÄÈÔÔÅÐÅÍÖÈÀËÜÍÛÉ ÊÐÈÏÒÎÀÍÀËÈÇ 37
ÄÅÏÎÍÈÐÎÂÀÍÈÅ ÊËÞ×ÅÉ 37
ÄÎÊÓÌÅÍÒÈÐÎÂÀÍÍÀß ÈÍÔÎÐÌÀÖÈß 37
Ç 38
ÇÀÙÈÒÀ ÈÍÔÎÐÌÀÖÈÈ 38
ÇÀØÈÔÐÎÂÀÍÈÅ 38
ÇÀÙÈÙÅÍÍÎÑÒÜ 38
ÇÎÍÀ ÁÅÇÎÏÀÑÍÎÑÒÈ 38
ÇËÎÓÌÛØËÅÍÍÈÊ 38
Êðàòêèé òîëêîâûé ñëîâàðü ïî èíôîðìàöèîííîé áåçîïàñíîñòè
© Copyright, 1998-2000, À.Â. Ëóêàöêèé 6
È 39
ÈÄÅÍÒÈÔÈÊÀÖÈß 39
ÈÄÅÍÒÈÔÈÊÀÒÎÐ 39
ÈÇÁÈÐÀÒÅËÜÍÛÉ ÄÎÑÒÓÏ 39
ÈÍÔÎÐÌÀÖÈß 39
ÈÌÈÒÎÇÀÙÈÒÀ 39
ÈÌÈÒÎÂÑÒÀÂÊÀ 40
ÈÍÑÒÐÓÊÒÈÂÍÛÅ ÓÊÀÇÀÍÈß ÃÎÑÓÄÀÐÑÒÂÅÍÍÎÃÎ ÀÐÁÈÒÐÀÆÀ ÑÑÑÐ ¹ È-1-4 40
Ê 41
ÊËÞ× ÊÐÈÏÒÎÃÐÀÔÈ×ÅÑÊÈÉ 41
ÊÎÄ 41
ÊÎÄÈÐÎÂÀÍÈÅ 41
ÊÐÈÏÒÎÃÐÀÔÈß 41
ÊÐÈÏÒÎÃÐÀÔÈ×ÅÑÊÀß ÑÈÑÒÅÌÀ 41
ÊÎÍÒÐÎËÜ ÄÎÑÒÓÏÀ 41
ÊÎÍÔÈÄÅÍÖÈÀËÜÍÎÑÒÜ 41
ÊÎÍÔÈÄÅÍÖÈÀËÜÍÀß ÈÍÔÎÐÌÀÖÈß 42
ÊÎÍÖÅÏÖÈß ÇÀÙÈÒÛ ÈÍÔÎÐÌÀÖÈÈ 42
ÊÐÈÏÒÎÀÍÀËÈÇ 42
ÊÐÈÏÒÎËÎÃÈß 42
ÊËÀÑÑ ÇÀÙÈÙÅÍÍÎÑÒÈ 43
ÊËÞ×ÅÂÀß ÑÈÑÒÅÌÀ 43
ÊÀÍÀËÜÍÎÅ ØÈÔÐÎÂÀÍÈÅ 43
ÊÐÀÑÍÀß ÊÍÈÃÀ 43
ÊÎÌÏÐÎÌÅÒÀÖÈß ÈÍÔÎÐÌÀÖÈÈ 43
ÊÐÈÏÒÎÑÈÑÒÅÌÀ Ñ ÑÅÊÐÅÒÍÛÌ ÊËÞ×ÎÌ 43
ÊÐÈÏÒÎÑÈÑÒÅÌÀ Ñ ÎÒÊÐÛÒÛÌ ÊËÞ×ÎÌ 44
ÊÂÀÄÐÀÒ ÂÈÆÈÍÅÐÀ 44
ÊÀÇÈÑÊÈ ÌÅÒÎÄ 44
ÊÂÀÄÐÀÒ ÏÎËÈÁÈß 44
ÊÀÐÄÀÍÎ ÐÅØÅÒÊÀ 44
ÊÎÄÛ, ÈÑÏÐÀÂËßÞÙÈÅ ÎØÈÁÊÈ 45
ÊÎÄÛ ÃÎÏÏÛ 45
ÊÐÈÏÒÎÃÐÀÔÈ×ÅÑÊÈÉ ÏÐÎÒÎÊÎË 45
ÊÐÈÏÒÎÃÐÀÔÈ×ÅÑÊÎÅ ÏÐÅÎÁÐÀÇÎÂÀÍÈÅ ÈÍÔÎÐÌÀÖÈÈ 45
ÊÂÀÍÒÎÂÀß ÊÐÈÏÒÎÃÐÀÔÈß 45
ÊÐÈÏÒÎÑÈÑÒÅÌÀ Ñ ÂÐÅÌÅÍÍÛÌ ÐÀÑÊÐÛÒÈÅÌ 46
ÊÐÈÏÒÎÑÈÑÒÅÌÀ Ñ ÝËËÈÏÒÈ×ÅÑÊÈÌÈ ÊÐÈÂÛÌÈ 46
ÊÐÈÏÒÎÑÈÑÒÅÌÀ ÌÀÊÝËÈÑÀ 46
ÊÐÈÏÒÎÑÈÑÒÅÌÀ ÍÈÄÅÐÐÀÉÒÅÐÀ 46
ÊÐÈÏÒÎÑÈÑÒÅÌÀ ÃÀÁÈÄÓËÈÍÀ 46
ÊÐÈÏÒÎÑÈÑÒÅÌÀ ÊÐÓÊÀ 46
ÊÐÈÏÒÎÑÈÑÒÅÌÀ ÂÅÐÍÀÌÀ 47
ÊÎËËÈÇÈß 47
ÊÎÄ ÀÓÒÅÍÒÈÔÈÊÀÖÈÈ ÑÎÎÁÙÅÍÈß 47
ÊÎÄ ÖÅËÎÑÒÍÎÑÒÈ ÑÎÎÁÙÅÍÈÉ 47
ÊÎÍÒÐÎËÜ ÝÔÔÅÊÒÈÂÍÎÑÒÈ ÇÀÙÈÒÛ ÈÍÔÎÐÌÀÖÈÈ 47
Ë 48
Êðàòêèé òîëêîâûé ñëîâàðü ïî èíôîðìàöèîííîé áåçîïàñíîñòè
© Copyright, 1998-2000, À.Â. Ëóêàöêèé 7
ËÈÖÅÍÇÈÐÎÂÀÍÈÅ 48
ËÈÖÅÍÇÈß 48
ËÈÖÅÍÇÈÀÒ 48
ËÈÖÅÍÇÈÀÐ 48
ËÞÊ 48
ËÎÃÈ×ÅÑÊÀß ÁÎÌÁÀ 48
ËÈÍÅÉÍÛÉ ÊÐÈÏÒÎÀÍÀËÈÇ 48
Ì 50
ÌÀÍÄÀÒÍÛÉ ÄÎÑÒÓÏ 50
ÌÀÑÊÀÐÀÄ 50
ÌÎÐÀËÜÍÎ-ÝÒÈ×ÅÑÊÈÅ ÌÅÐÛ ÇÀÙÈÒÛ ÈÍÔÎÐÌÀÖÈÈ 50
ÌÀÒÐÈÖÀ ÄÎÑÒÓÏÀ 51
ÌÀÍÄÀÒ 51
ÌÈÍÈÌÓÌ ÏÐÈÂÈËÅÃÈÉ 51
ÌÍÎÃÎÓÐÎÂÍÅÂÀß ÁÅÇÎÏÀÑÍÎÑÒÜ 51
ÌÎÍÈÒÎÐ ÑÑÛËÎÊ 51
ÌÅÒÊÀ ÊÎÍÔÈÄÅÍÖÈÀËÜÍÎÑÒÈ 51
ÌÍÎÃÎÓÐÎÂÍÅÂÀß ÇÀÙÈÒÀ 51
ÌÎÄÅËÜ ÍÀÐÓØÈÒÅËß 52
ÌÎÄÅËÜ ÇÀÙÈÒÛ 52
ÌÍÎÃÎÓÐÎÂÍÅÂÀß ÊÐÈÏÒÎÃÐÀÔÈß 52
Í 53
ÍÅÑÀÍÊÖÈÎÍÈÐÎÂÀÍÍÛÉ ÄÎÑÒÓÏ 53
ÍÑÄ 53
ÍÅÑÀÍÊÖÈÎÍÈÐÎÂÀÍÍÎÅ ÄÅÉÑÒÂÈÅ 53
ÍÀÐÓØÈÒÅËÜ 53
ÍÀÖÈÎÍÀËÜÍÛÉ ÖÅÍÒÐ ÊÎÌÏÜÞÒÅÐÍÎÉ ÁÅÇÎÏÀÑÍÎÑÒÈ 53
ÍÎÑÈÒÅËÈ ÈÍÔÎÐÌÀÖÈÈ 53
ÍÎÐÌÛ ÝÔÔÅÊÒÈÂÍÎÑÒÈ ÇÀÙÈÒÛ ÈÍÔÎÐÌÀÖÈÈ 54
Î 55
ÎÒÊÐÛÒÛÉ ÊËÞ× 55
ÎÒÊÐÛÒÛÉ ÒÅÊÑÒ 55
ÎÁÍÀÐÓÆÅÍÈÅ ÀÒÀÊ 55
ÎÁÐÀÁÎÒÊÀ ÈÍÔÎÐÌÀÖÈÈ Â ÀÑ 55
ÎÁÚÅÊÒ 55
ÎÐÃÀÍÈÇÀÖÈÎÍÍÛÅ ÌÅÐÛ ÇÀÙÈÒÛ ÈÍÔÎÐÌÀÖÈÈ 55
ÎÒÊÀÇ Â ÎÁÑËÓÆÈÂÀÍÈÈ 56
ÎÐÀÍÆÅÂÀß ÊÍÈÃÀ 56
ÎÊÎÍÅ×ÍÎÅ ØÈÔÐÎÂÀÍÈÅ 56
ÎÄÍÎÑÒÎÐÎÍÍßß ÔÓÍÊÖÈß 56
ÎÄÍÎÑÒÎÐÎÍÍßß ÔÓÍÊÖÈß Ñ ÑÅÊÐÅÒÎÌ 56
ÎÒÊÐÛÒÎÅ ÐÀÑÏÐÅÄÅËÅÍÈÅ ÊËÞ×ÅÉ 56
ÎÄÍÎÐÀÇÎÂÀß ÖÈÔÐÎÂÀß ÏÎÄÏÈÑÜ 57
ÎÄÍÎÐÀÇÎÂÛÉ ÁËÎÊÍÎÒ 57
Ï 58
Êðàòêèé òîëêîâûé ñëîâàðü ïî èíôîðìàöèîííîé áåçîïàñíîñòè
© Copyright, 1998-2000, À.Â. Ëóêàöêèé 8
ÏÀÐÎËÜ 58
ÏÎËÍÎÌÎ×Èß 58
ÏÐÀÂÈËÎ ÄÎÑÒÓÏÀ 58
ÏÐÀÂÎ ÄÎÑÒÓÏÀ 58
ÏÐÎÔÈËÜ ÏÎËÍÎÌÎ×ÈÉ 58
ÏÐÈÂÈËÅÃÈÈ 58
ÏËÀÍ ÇÀÙÈÒÛ 58
ÏÎËÈÒÈÊÀ ÁÅÇÎÏÀÑÍÎÑÒÈ 58
ÏÎÄÏÈÑÜ ÊÎÄÀ 59
ÏÎÒÎÊÎÂÛÉ ØÈÔÐ 59
ÏÐÀÂÈËÀ ÐÀÇÃÐÀÍÈ×ÅÍÈß ÄÎÑÒÓÏÀ 59
ÏÐÀÂÎÂÛÅ ÌÅÐÛ ÇÀÙÈÒÛ ÈÍÔÎÐÌÀÖÈÈ 59
ÏÎËÍÎÌÎ×ÍÛÉ ÄÎÑÒÓÏ 59
ÏÎÄÎÒ×ÅÒÍÎÑÒÜ 60
ÏËÀÍ ÎÁÅÑÏÅ×ÅÍÈß ÍÅÏÐÅÐÛÂÍÎÉ ÐÀÁÎÒÛ È ÂÎÑÑÒÀÍÎÂËÅÍÈß 60
ÏÎÂÒÎÐÍÎÅ ÈÑÏÎËÜÇÎÂÀÍÈÅ ÎÁÚÅÊÒÀ 60
ÏÐÀÂÈËÎ ÊÈÐÊÎÔÔÀ 60
ÏÎËÈÁÈß ÊÂÀÄÐÀÒ 60
ÏÎÊÀÇÀÒÅËÜ ÇÀÙÈÙÅÍÍÎÑÒÈ 60
ÏÐÎÒÎÊÎË Ñ ÀÐÁÈÒÐÎÌ 60
ÏÐÎÒÎÊÎË Ñ ÒÐÅÒÅÉÑÊÈÌ ÑÓÄÜÅÉ 61
ÏÐÎÒÎÊÎË, ÑÀÌÎÎÁÅÑÏÅ×ÈÂÀÞÙÈÉ ÇÀÊÎÍÍÎÑÒÜ 61
ÏÐÎÒÎÊÎË ÎÒÐÈÖÀÍÈß 61
ÏÎËÍÛÉ ÏÅÐÅÁÎÐ 61
ÏÎÑÐÅÄÍÈÊ 61
ÏÎÊÀÇÀÒÅËÜ ÝÔÔÅÊÒÈÂÍÎÑÒÈ ÇÀÙÈÒÛ ÈÍÔÎÐÌÀÖÈÈ 61
ÏÎËÜÇÎÂÀÒÅËÜ ÈÍÔÎÐÌÀÖÈÈ 61
ÏÎÒÐÅÁÈÒÅËÜ ÈÍÔÎÐÌÀÖÈÈ 62
ÏÎÑÒÀÍÎÂËÅÍÈÅ ÏÐÀÂÈÒÅËÜÑÒÂÀ ÐÔ ¹1233 62
ÏÎÑÒÀÍÎÂËÅÍÈÅ ÏÐÀÂÈÒÅËÜÑÒÂÀ ÐÔ ¹333 62
ÏÎÑÒÀÍÎÂËÅÍÈÅ ÏÐÀÂÈÒÅËÜÑÒÂÀ ÐÑÔÑÐ ¹35 62
ÏÎÑÒÀÍÎÂËÅÍÈÅ ÏÐÀÂÈÒÅËÜÑÒÂÀ ÐÔ ¹608 62
ÏÈÑÜÌÎ ÂÛÑØÅÃÎ ÀÐÁÈÒÐÀÆÍÎÃÎ ÑÓÄÀ ÐÔ ¹ Ñ1-7/ÎÏ-587 62
ÏÈÑÜÌÎ ÂÛÑØÅÃÎ ÀÐÁÈÒÐÀÆÍÎÃÎ ÑÓÄÀ ÐÔ ¹ Ñ1-7/ÎÇ-316 63
Ð 64
ÐÀÇÃÐÀÍÈ×ÅÍÈÅ ÄÎÑÒÓÏÀ 64
ÐÀÑØÈÔÐÎÂÀÍÈÅ 64
ÐÀÑÏÎÇÍÀÂÀÍÈÅ ÀÒÀÊÈ 64
ÐÅÃËÀÌÅÍÒÀÖÈß 64
ÐÓÊÎÂÎÄßÙÈÉ ÄÎÊÓÌÅÍÒ 64
ÐÀÄÓÆÍÀß ÑÅÐÈß 64
ÐÎÒÎÐÍÀß ÌÀØÈÍÀ 65
ÐÅØÅÒÊÀ ÊÀÐÄÀÍÎ 65
ÐÀÇÄÅËÅÍÈÅ ÑÅÊÐÅÒÎÂ 65
ÐÅÃÈÑÒÐ ÑÄÂÈÃÀ Ñ ÎÁÐÀÒÍÎÉ ÑÂßÇÜÞ 65
ÐÀÑÏÐÅÄÅËÅÍÈÅ ÊËÞ×ÅÉ 65
ÐÅØÅÍÈÅ ÃÎÑÒÅÕÊÎÌÈÑÑÈÈ È ÔÀÏÑÈ ¹10 65
ÐÓÊÎÂÎÄßÙÈÉ ÄÎÊÓÌÅÍÒ «ÊÎÍÖÅÏÖÈß ÇÀÙÈÒÛ ÑÂÒ È ÀÑ ÎÒ ÍÑÄ Ê ÈÍÔÎÐÌÀÖÈÈ»
66
ÐÓÊÎÂÎÄßÙÈÉ ÄÎÊÓÌÅÍÒ «ÇÀÙÈÒÀ ÎÒ ÍÅÑÀÍÊÖÈÎÍÈÐÎÂÀÍÍÎÃÎ ÄÎÑÒÓÏÀ Ê
ÈÍÔÎÐÌÀÖÈÈ. ÒÅÐÌÈÍÛ È ÎÏÐÅÄÅËÅÍÈß» 66
ÐÓÊÎÂÎÄßÙÈÉ ÄÎÊÓÌÅÍÒ «ÂÐÅÌÅÍÍÎÅ ÏÎËÎÆÅÍÈÅ ÏÎ ÎÐÃÀÍÈÇÀÖÈÈ ÐÀÇÐÀÁÎÒÊÈ,
ÈÇÃÎÒÎÂËÅÍÈß È ÝÊÑÏËÓÀÒÀÖÈÈ ÏÐÎÃÐÀÌÌÍÛÕ È ÒÅÕÍÈ×ÅÑÊÈÕ ÑÐÅÄÑÒ ÇÀÙÈÒÛ
Êðàòêèé òîëêîâûé ñëîâàðü ïî èíôîðìàöèîííîé áåçîïàñíîñòè
© Copyright, 1998-2000, À.Â. Ëóêàöêèé 9
ÈÍÔÎÐÌÀÖÈÈ ÎÒ ÍÑÄ Â ÀÂÒÎÌÀÒÈÇÈÐÎÂÀÍÍÛÕ ÑÈÑÒÅÌÀÕ È ÑÐÅÄÑÒÂÀÕ
ÂÛ×ÈÑËÈÒÅËÜÍÎÉ
ÒÅÕÍÈÊÈ» 66
ÐÓÊÎÂÎÄßÙÈÉ ÄÎÊÓÌÅÍÒ «ÀÂÒÎÌÀÒÈÇÈÐÎÂÀÍÍÛÅ ÑÈÑÒÅÌÛ. ÇÀÙÈÒÀ ÎÒ
ÍÅÑÀÍÊÖÈÎÍÈÐÎÂÀÍÍÎÃÎ ÄÎÑÒÓÏÀ Ê ÈÍÔÎÐÌÀÖÈÈ. ÊËÀÑÑÈÔÈÊÀÖÈß
ÀÂÒÎÌÀÒÈÇÈÐÎÂÀÍÍÛÕ
ÑÈÑÒÅÌ È ÒÐÅÁÎÂÀÍÈß ÏÎ ÇÀÙÈÒÅ ÈÍÔÎÐÌÀÖÈÈ» 67
ÐÓÊÎÂÎÄßÙÈÉ ÄÎÊÓÌÅÍÒ «ÑÐÅÄÑÒÂÀ ÂÛ×ÈÑËÈÒÅËÜÍÎÉ ÒÅÕÍÈÊÈ. ÇÀÙÈÒÀ ÎÒ
ÍÅÑÀÍÊÖÈÎÍÈÐÎÂÀÍÍÎÃÎ ÄÎÑÒÓÏÀ Ê ÈÍÔÎÐÌÀÖÈÈ. ÏÎÊÀÇÀÒÅËÈ ÇÀÙÈÙÅÍÍÎÑÒÈ
ÎÒ ÍÑÄ Ê
ÈÍÔÎÐÌÀÖÈÈ» 67
ÐÓÊÎÂÎÄßÙÈÉ ÄÎÊÓÌÅÍÒ «ÑÐÅÄÑÒÂÀ ÂÛ×ÈÑËÈÒÅËÜÍÎÉ ÒÅÕÍÈÊÈ. ÌÅÆÑÅÒÅÂÛÅ
ÝÊÐÀÍÛ. ÇÀÙÈÒÀ ÎÒ ÍÅÑÀÍÊÖÈÎÍÈÐÎÂÀÍÍÎÃÎ ÄÎÑÒÓÏÀ Ê ÈÍÔÎÐÌÀÖÈÈ.
ÏÎÊÀÇÀÒÅËÈ
ÇÀÙÈÙÅÍÍÎÑÒÈ ÎÒ ÍÅÑÀÍÊÖÈÎÍÈÐÎÂÀÍÍÎÃÎ ÄÎÑÒÓÏÀ Ê ÈÍÔÎÐÌÀÖÈÈ» 67
ÐÓÊÎÂÎÄßÙÈÉ ÄÎÊÓÌÅÍÒ «ÇÀÙÈÒÀ ÈÍÔÎÐÌÀÖÈÈ. ÑÏÅÖÈÀËÜÍÛÅ ÇÀÙÈÒÍÛÅ ÇÍÀÊÈ.
ÊËÀÑÑÈÔÈÊÀÖÈß È ÎÁÙÈÅ ÒÐÅÁÎÂÀÍÈß» 68
Ñ 69
ÑÅÐÒÈÔÈÊÀÖÈß ÑÇÈ 69
ÑÅÐÒÈÔÈÊÀÒ ÑÎÎÒÂÅÒÑÒÂÈß 69
ÑÈÑÒÅÌÀ ÇÀÙÈÒÛ ÈÍÔÎÐÌÀÖÈÈ 69
ÑÈÑÒÅÌÀ ÊÐÈÏÒÎÃÐÀÔÈ×ÅÑÊÎÉ ÇÀÙÈÒÛ ÈÍÔÎÐÌÀÖÈÈ 69
ÑÈÑÒÅÌÀ ÎÁÍÀÐÓÆÅÍÈß ÀÒÀÊ 69
ÑÈÑÒÅÌÀ ÀÍÀËÈÇÀ ÇÀÙÈÙÅÍÍÎÑÒÈ 70
ÑÊÐÅÌÁËÅÐ 70
ÑÐÅÄÑÒÂÎ ÇÀÙÈÒÛ ÈÍÔÎÐÌÀÖÈÈ 70
ÑÒÎÉÊÎÑÒÜ 70
ÑÍÈÔÔÈÍÃ 70
ÑÏÓÔÔÈÍÃ 70
ÑÓÁÚÅÊÒÛ ÈÍÔÎÐÌÀÖÈÎÍÍÛÕ ÎÒÍÎØÅÍÈÉ 70
ÑÓÁÚÅÊÒ 71
«ÑÀËßÌÈ» ÀÒÀÊÀ 71
ÑÊÐÛÒÛÅ ÊÀÍÀËÛ 71
ÑÊÐÛÒÛÉ ÂÐÅÌÅÍÍÎÉ ÊÀÍÀË 71
ÑÊÐÛÒÛÉ ÊÀÍÀË Ñ ÏÀÌßÒÜÞ 71
ÑÁÎÐÊÀ ÌÓÑÎÐÀ 71
ÑÏÈÑÎÊ ÊÎÍÒÐÎËß ÄÎÑÒÓÏÀ 71
ÑÒÎÐÍÅÒÒÀ-ÕÀÁÅÐÀ ÀËÃÎÐÈÒÌ 71
ÑÒÅÃÀÍÎÃÐÀÔÈß 72
ÑÈÍÕÐÎÍÈÇÈÐÓÞÙÀßÑß ÏÎÒÎÊÎÂÀß ÊÐÈÏÒÎÑÈÑÒÅÌÀ 72
ÑÀÌÎÑÈÍÕÐÎÍÈÇÈÐÓÞÙÀßÑß ÏÎÒÎÊÎÂÀß ÊÐÈÏÒÎÑÈÑÒÅÌÀ 72
Ñ×ÅÒ×ÈÊÎÂÛÉ ÌÅÒÎÄ 72
ÑÎÂÅÐØÅÍÍÀß ÑÅÊÐÅÒÍÎÑÒÜ 73
ÑËÅÏÀß ÏÎÄÏÈÑÜ 73
ÑÀÌÎÏÐÎÂÅÐßÞÙÀßÑß ÏÎÄÏÈÑÜ 73
ÑÅÐÒÈÔÈÊÀÒ ÊËÞ×À 73
ÑÏÈÑÎÊ ÀÍÍÓËÈÐÎÂÀÍÍÛÕ ÑÅÐÒÈÔÈÊÀÒÎÂ 73
ÑÅÐÂÅÐ-ÏÎÑÐÅÄÍÈÊ 73
ÑÅÊÐÅÒÍÛÉ ÊËÞ× 73
ÑÎÁÑÒÂÅÍÍÈÊ ÈÍÔÎÐÌÀÖÈÈ 74
Ò 75
ÒÐÎßÍÑÊÈÉ ÊÎÍÜ 75
ÒÅÕÍÈ×ÅÑÊÈÅ ÌÅÐÛ ÇÀÙÈÒÛ ÈÍÔÎÐÌÀÖÈÈ 75
Êðàòêèé òîëêîâûé ñëîâàðü ïî èíôîðìàöèîííîé áåçîïàñíîñòè
© Copyright, 1998-2000, À.Â. Ëóêàöêèé 10
ÒÓÍÍÅËÈÐÎÂÀÍÈÅ 75
Ó 76
ÓßÇÂÈÌÎÑÒÜ ÀÑ 76
ÓßÇÂÈÌÎÑÒÜ ÑÓÁÚÅÊÒÀ ÈÍÔÎÐÌÀÖÈÎÍÍÛÕ ÎÒÍÎØÅÍÈÉ 76
ÓßÇÂÈÌÎÑÒÜ ÈÍÔÎÐÌÀÖÈÈ 76
ÓÃÐÎÇÀ ÀÑ 76
ÓÃÐÎÇÀ ÈÍÒÅÐÅÑÀÌ ÑÓÁÚÅÊÒÎÂ ÈÍÔÎÐÌÀÖÈÎÍÍÛÕ ÎÒÍÎØÅÍÈÉ 76
ÓÃÐÎÇÀ ÁÅÇÎÏÀÑÍÎÑÒÈ ÈÍÔÎÐÌÀÖÈÈ 76
ÓÏÐÀÂËÅÍÈÅ ÊËÞ×ÀÌÈ 77
ÓÏÐÀÂËÅÍÈÅ ÄÎÑÒÓÏÎÌ 77
ÓÐÎÂÅÍÜ ÁÅÇÎÏÀÑÍÎÑÒÈ 77
ÓÐÎÂÅÍÜ ÏÐÎÇÐÀ×ÍÎÑÒÈ 77
ÓÐÎÂÅÍÜ ÄÎÑÒÓÏÀ 77
ÓÐÎÂÅÍÜ ÏÎËÍÎÌÎ×ÈÉ 77
ÓÐÎÂÅÍÜ ÏÐÈÂÈËÅÃÈÉ 77
ÓÑÒÀÍÎÂËÅÍÈÅ ÏÎÄËÈÍÍÎÑÒÈ 77
ÓÊÀÇ ÏÐÅÇÈÄÅÍÒÀ ÐÔ ¹334 77
ÓÊÀÇ ÏÐÅÇÈÄÅÍÒÀ ÐÔ ¹188 78
Ô 79
ÔÅÄÅÐÀËÜÍÎÅ ÀÃÅÍÒÑÒÂÎ ÏÐÀÂÈÒÅËÜÑÒÂÅÍÍÎÉ ÑÂßÇÈ È ÈÍÔÎÐÌÀÖÈÈ 79
ÔÀÏÑÈ 79
ÔÈÇÈ×ÅÑÊÈÅ ÌÅÐÛ ÇÀÙÈÒÛ ÈÍÔÎÐÌÀÖÈÈ 79
Õ 80
ÕÝØ-ÔÓÍÊÖÈß 80
ÕÀÃÅËÈÍÀ ÌÀØÈÍÀ 80
Ö 81
ÖÅËÎÑÒÍÎÑÒÜ 81
ÖÈÔÐÎÂÀß ÏÎÄÏÈÑÜ 81
ÖÅËÜ ÇÀÙÈÒÛ ÈÍÔÎÐÌÀÖÈÈ 81
ÖÅÍÒÐ ÐÀÑÏÐÅÄÅËÅÍÈß ÊËÞ×ÅÉ 81
ÖÅÍÒÐ ÑÅÐÒÈÔÈÊÀÖÈÈ ÊËÞ×ÅÉ 81
ÖÈÔÐÎÂÎÉ ÊÎÍÂÅÐÒ 82
× 83
×ÅÐÂÜ 83
Ø 84
ØÈÔÐ 84
ØÈÔÐÎÂÀÍÈÅ 84
ØÈÔÐÒÅÊÑÒ 84
Êðàòêèé òîëêîâûé ñëîâàðü ïî èíôîðìàöèîííîé áåçîïàñíîñòè
© Copyright, 1998-2000, À.Â. Ëóêàöêèé 11
ØÀÐÀÄÛ ÌÅÐÊËß 84
ØÀÐÀÄÛ Ñ ÂÐÅÌÅÍÍÛÌ ÇÀÌÊÎÌ 84
ØÈÔÐ ÔÅÉÑÒÅËß 85
ØËÞÇ ÏÐÈÊËÀÄÍÎÃÎ ÓÐÎÂÍß 85
ØËÞÇ ÑÅÀÍÑÎÂÎÃÎ ÓÐÎÂÍß 85
ØËÞÇ ÄÂÓÕÏÎÐÒÎÂÛÉ 85
ØÈÔÐÎÂÀËÜÍÛÅ ÑÐÅÄÑÒÂÀ 85
Ý 86
ÝÊÐÀÍ ÌÅÆÑÅÒÅÂÎÉ 86
ÝÊÐÀÍ ÌÅÆÑÅÒÅÂÎÉ Ñ ÔÈËÜÒÐÀÖÈÅÉ ÏÀÊÅÒÎÂ 86
ÝËÅÊÒÐÎÍÍÀß ÖÈÔÐÎÂÀß ÏÎÄÏÈÑÜ 86
ÝÖÏ 86
ÝÊÑÏÎÍÅÍÖÈÀËÜÍÎÅ ÐÀÑÏÐÅÄÅËÅÍÈÅ ÊËÞ×ÅÉ 87
ÝËÜ-ÃÀÌÀËß ÀËÃÎÐÈÒÌ 87
ÝËËÈÏÒÈ×ÅÑÊÈÅ ÊÐÈÂÛÅ 87
ÝÔÔÅÊÒÈÂÍÎÑÒÜ ÇÀÙÈÒÛ ÈÍÔÎÐÌÀÖÈÈ 87
ß 88
ßÄÐÎ ÁÅÇÎÏÀÑÍÎÑÒÈ 88
A 89
AMERICAN NATIONAL STANDARDS INSTITUTE 89
ANSI 89
ANSI X9.9 89
ANSI X9.17 89
ANSI X9.23 89
ANSI X9.30 89
ANSI X9.31 89
ANSI X9.41 90
ANSI X9.42 90
ANSI X9.44 90
ANSI X9.45 90
ANSI X12.58 90
AUTHENTICODE 90
ASSIST 90
AUTOMATED SYSTEMS SECURITY INCIDENT SUPPORT TEAM 91
AUDIT 91
AUDIT TRAIL 91
AUTHENTICATION 91
ACCESS PERIOD 91
ACCESS CONTROL 91
ACCESS CONTROL LIST 91
ÑÌ. ÑÁÎÐÊÀ ÌÓÑÎÐÀ 91
ACCOUNTABILITY 91
ASSURANCE 92
AUTHORIZATION 92
ASYMMETRIC CRYPTOGRAPHY 92
ADAPTIVE CHOSEN CIPHERTEXT ATTACK 92
ARBITRATED PROTOCOL 92
Êðàòêèé òîëêîâûé ñëîâàðü ïî èíôîðìàöèîííîé áåçîïàñíîñòè
© Copyright, 1998-2000, À.Â. Ëóêàöêèé 12
ADJUDICATED PROTOCOL 92
AS2805.6.5.3 92
APPLICATION-LEVEL GATEWAY 92
A GUIDE TO UNDERSTANDING AUDIT IN TRUSTED SYSTEMS 93
A GUIDE TO UNDERSTANDING DISCRETIONARY ACCESS CONTROL IN TRUSTED
SYSTEMS 93
A GUIDE TO UNDERSTANDING CONFIGURATION MANAGEMENT IN TRUSTED SYSTEMS
93
A GUIDE TO UNDERSTANDING DESIGN DOCUMENTATION IN TRUSTED SYSTEMS 93
A GUIDE TO UNDERSTANDING TRUSTED DISTRIBUTION IN TRUSTED SYSTEMS 94
A GUIDE TO UNDERSTANDING SECURITY MODELING IN TRUSTED SYSTEMS 94
A GUIDE TO UNDERSTANDING TRUSTED FACILITY MANUALS 94
A GUIDE TO UNDERSTANDING IDENTIFICATION AND AUTHENTICATION IN
TRUSTED SYSTEMS 94
A GUIDE TO UNDERSTANDING OBJECT REUSE IN TRUSTED SYSTEMS 95
A GUIDE TO UNDERSTANDING TRUSTED RECOVERY IN TRUSTED SYSTEMS 95
A GUIDE TO UNDERSTANDING SECURITY TESTING AND TEST DOCUMENTATION IN
TRUSTED
SYSTEMS 95
A GUIDE TO PROCUREMENT OF TRUSTED SYSTEMS: AN INTRODUCTION TO
PROCUREMENT
INITIATORS ON COMPUTER SECURITY REQUIREMENTS 95
A GUIDE TO PROCUREMENT OF TRUSTED SYSTEMS: LANGUAGE FOR RFP
SPECIFICATIONS AND
STATEMENTS OF WORK AN AID TO PROCUREMENT INITIATORS 95
A GUIDE TO PROCUREMENT OF TRUSTED SYSTEMS: COMPUTER SECURITY
CONTRACT DATA
REQUIREMENTS LIST AND DATA ITEM DESCRIPTION TUTORIAL 96
A GUIDE TO PROCUREMENT OF TRUSTED SYSTEMS: HOW TO EVALUATE A BIDDERS
PROPOSAL DOCUMENT AN AID TO PROCUREMENT INITIATORS AND CONTRACTORS
96
A GUIDE TO UNDERSTANDING DATA REMANENCE IN AUTOMATED INFORMATION
SYSTEMS 96
A GUIDE TO WRITING THE SECURITY FEATURES USERS GUIDE FOR TRUSTED
SYSTEMS 97
A GUIDE TO UNDERSTANDING INFORMATION SYSTEM SECURITY OFFICER
RESPONSIBILITIES
FOR AUTOMATED INFORMATION SYSTEMS 97
ACCESSING CONTROLLED ACCESS PROTECTION 97
A GUIDE TO UNDERSTANDING COVERT CHANNEL ANALYSIS OF TRUSTED SYSTEMS
97
AES 97
ADVANCED ENCRYPTION STANDARD 98
AMBER BOOK 98
AQUA BOOK 98
B 99
BLOWFISH 99
BLOCK CIPHER 99
BELL-LAPADULLA MODEL 99
BACKUP PLAN 99
BANKING CIRCULAR 226 99
BC-226 99
BANKING CIRCULAR 229 99
BC-229 99
BLIND SIGNATURE SCHEME 100
BRUTE-FORCE ATTACK 100
BRUTE-FORCE SEARCH 100
BIRTHDAY ATTACK 100
BASTION HOST 101
BRIGHT BLUE BOOK 101
BURGUNDY BOOK 101
BROWN BOOK 101
BLUE BOOK 101
BRIGHT ORANGE BOOK 101
Êðàòêèé òîëêîâûé ñëîâàðü ïî èíôîðìàöèîííîé áåçîïàñíîñòè
© Copyright, 1998-2000, À.Â. Ëóêàöêèé 13
C 102
CIPHER 102
CIPHERTEXT 102
CIPHER BLOCK CHAINING 102
CBC 102
CIPHER FEEDBACK 102
CFB 102
CAPSTONE 103
CLIPPER 103
CODE SIGNING 103
CERT 103
COMPUTER EMERGENCY RESPONSE TEAM 103
CIAC 104
COMPUTER INCIDENT ADVISORY CAPABILITY 104
CRYPTOGRAPHY 104
COVERT CHANNELS 104
COVERT STORAGE CHANNEL 105
COVERT TIMING CHANNEL 105
CAPABILITY 105
CONFIDENTIALITY 105
CONTINGENCY PLAN 105
COMPUTER SECURITY AGENCY 105
COMMERCIAL PRODUCT EVALUATION 105
COMMERCIAL COMPUTER SECURITY CENTRE 106
COMPROMISE 106
COUNTERFEIT ACCESS DEVICE AND COMPUTER FRAUD AND ABUSE ACT OF 1984
106
COMPUTER FRAUD AND ABUSE ACT OF 1986 106
COMPUTER SECURITY ACT OF 1987, PL 100-235 106
COMPUTER MISUSE ACT OF 1990 106
CHOSEN PLAINTEXT ATTACK 106
CHOSEN CIPHERTEXT ATTACK 107
CHOSEN MESSAGE ATTACK 107
CIPHERTEXT ONLY ATTACK 107
CHOSEN KEY ATTACK 107
C-36 107
COUNTER METHOD 107
CIPHERTEXT AUTO KEY 107
CTAK 108
CERTIFICATE 108
CERTIFICATE REVOCATION LIST 108
CAPI 108
CRYPTOGRAPHIC APPLICATION PROGRAMMING INTERFACE 108
CRYPTOKI 108
CIRCUIT-LEVEL GATEWAY 108
CHALLENGE-HANDSHAKE AUTHENTICATION PROTOCOL 108
CHAP 109
COMPUTER OPERATIONS AUDIT AND SECURITY TECHNOLOGY 109
COAST 109
COMPUTER SECURITY REQUIREMENTS GUIDANCE FOR APPLYING THE DOD TCSEC
IN
SPECIFIC ENVIRONMENTS 109
COMPUTER SECURITY SUBSYSTEM INTERPRETATION OF THE TCSEC 109
CSC-STD-001-83 109
CSC-STD-002-85 110
CSC-STD-003-85 110
Êðàòêèé òîëêîâûé ñëîâàðü ïî èíôîðìàöèîííîé áåçîïàñíîñòè
© Copyright, 1998-2000, À.Â. Ëóêàöêèé 14
CSC-STD-004-85 110
D 111
DIGITAL SIGNATURE ALGORITHM 111
DSA 111
DIGITAL SIGNATURE STANDARD 111
DSS 111
DIFFIE-HELLMAN 111
DATA ENCRYPTION STANDARD 111
DES 111
DESX 112
ÑÌ. ÒÀÊÆÅ DATA ENCRYPTION STANDARD 112
DISK SCAVENGING 112
DENIAL OF SERVICE 112
DISCRETIONARY ACCESS CONTROL 112
DEPARTMENT OF DEFENSE 112
DOD 112
DOD GUIDELINES FOR COMPUTER SECURITY 112
DOMAIN 113
DAC 113
DATA SECURITY OFFICER 113
DSO 113
DATA COMPUTER ACT OF 1984 113
DESIGNATED CONFIRMER SIGNATURE 113
DIFFERENTIAL CRYPTANALYSIS 113
DES-EEE3 113
DES-EDE3 114
DES-EEE2 114
DES-EDE2 114
DIGITAL FINGERPRINT 114
DAVIES-MEYER HASH FUNCTION 114
DUAL-HOMED GATEWAY 114
DEMILITARIZED ZONE 114
DMZ 115
DIGITAL ENVELOP 115
DARK LAVENDER BOOK 115
E 116
ELGAMAL 116
ELLIPTIC CURVES 116
ELECTRONIC CODEBOOK 116
ECB 116
EVALUATED PRODUCTS LIST 116
EPL 116
ELECTRONIC COMMUNICATIONS PRIVACY ACT OF 1986 117
ENIGMA 117
E31.20 117
ETEBAC 5 117
EXPONENTIAL KEY AGREEMENT 117
EXHAUSTIVE KEY SEARCH 117
ESCROWED ENCRYPTION STANDARD 117
Êðàòêèé òîëêîâûé ñëîâàðü ïî èíôîðìàöèîííîé áåçîïàñíîñòè
© Copyright, 1998-2000, À.Â. Ëóêàöêèé 15
EES 117
F 118
FORTEZZA 118
FEAL 118
FAST DATA ENCIPHERMENT ALGORITHM 118
FLAW 118
FAULT 118
FOREIGN CORRUPT PRACTICES ACT OF 1977 118
FAPKC 118
FAIL-STOP SIGNATURE SCHEME 119
FIREWALL 119
FORUM OF INCIDENT RESPONSE AND SECURITY TEAMS 119
FIRST 119
FEDERAL COMPUTER INCIDENT RESPONSE CAPABILITY 120
FEDCIRC 120
FOREST GREEN BOOK 120
G 121
G-DES 121
GARBAGE COLLECTING 121
GREEDY PROGRAM 121
GREEN BOOK 121
GUESSED PLAINTEXT ATTACK 121
GROUP SIGNATURE 121
GLOSSARY OF COMPUTER SECURITY TERMS 122
GUIDELINES FOR FORMAL VERIFICATION SYSTEMS 122
GUIDELINES FOR WRITING TRUSTED FACILITY MANUALS 122
H 123
HASH 123
HOLE 123
HOT PEACH BOOK 123
I 124
IKP 124
INTERNET KEYED PAYMENTS PROTOCOL 124
INTERNATIONAL ORGANIZATION FOR STANDARDIZATION 124
ISO 124
IEEE P1363 124
IEEE 802.10C 124
IDEA 124
INTERNATIONAL DATA ENCRYPTION ALGORITHM 125
IP-SPOOFING 125
IDENTIFICATION 125
INFORMATION TECHNOLOGY SECURITY EVALUATION CRITERIA 125
ITSEC 125
INTERNAL FEEDBACK 125
Êðàòêèé òîëêîâûé ñëîâàðü ïî èíôîðìàöèîííîé áåçîïàñíîñòè
© Copyright, 1998-2000, À.Â. Ëóêàöêèé 16
ITERATED BLOCK CIPHER 126
INTRUSION 126
INTRUSION DETECTION 126
INTRUSION DETECTION SYSTEM 126
IPSEC 126
IP SECURITY PROTOCOL 126
ÑÌ. ÒÀÊÆÅ INTERNET SECURITY ASSOCIATION & KEY MANAGEMENT PROTOCOL
127
ISAKMP ÎØÈÁÊÀ! ÇÀÊËÀÄÊÀ ÍÅ ÎÏÐÅÄÅËÅÍÀ.
INTEGRITY 127
INTRODUCTION TO CERTIFICATION AND ACCREDITATION CONCEPTS 127
INTERNET SECURITY ASSOCIATION & KEY MANAGEMENT PROTOCOL 127
ISAKMP 127
IKE 127
INTERNET KEY EXCHANGE 127
K 129
KNAPSACK 129
KERBEROS 129
KNOWN PLAINTEXT ATTACK 129
KEY 129
KEY STREAM GENERATOR 129
KEY AUTO KEY 129
KAK 129
KEY SCHEDULE 129
KEY MANAGEMENT 130
KEY GENERATION 130
KEY DISTRIBUTION 130
KEY STORAGE 130
KEY DELETION 130
KEY RECOVERY 130
KEY CRUNCHING 130
KEY ESCROW 130
L 132
LUC 132
LEAST PRIVILEGE 132
LINK ENCRYPTION 132
LOOPHOLE 132
LABEL 132
LINEAR FEEDBACK SHIFT REGISTER 132
LFSR 132
LAYER 2 FORWARDING 132
L2F 133
LAYER 2 TUNNELING PROTOCOL 133
L2TP 133
LIGHT YELLOW BOOK 133
LIGHT BLUE BOOK 133
LIGHT PINK BOOK 133
M 134
Êðàòêèé òîëêîâûé ñëîâàðü ïî èíôîðìàöèîííîé áåçîïàñíîñòè
© Copyright, 1998-2000, À.Â. Ëóêàöêèé 17
MERKLES TREE 134
MCELIECE CRYPTOSYSTEM 134
MIME OBJECT SECURITY SERVICE 134
MOSS 134
MAC 134
MD2 134
MD4 135
MD5 135
MASQUERADE 135
MANDATORY ACCESS CONTROL 135
MULTILEVEL SECURITY 135
M-209 CONVERTER 135
MESSAGE AUTHENTICATION CODE 135
MESSAGE INTEGRITY CHECK 136
MESSAGE SECURITY PROTOCOL 136
MSP 136
MAN-IN-THE-MIDDLE 136
MIDDLEPERSON ATTACK 136
MESSAGE DIGEST 136
N 137
NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 137
NIST 137
NBS 137
NATIONAL SECURITY AGENCY 137
NSA 137
NASIRC 137
NASA AUTOMATED SYSTEMS INCIDENT RESPONSE CAPABILITY 137
NATIONAL COMPUTER SECURITY CENTER 138
NCSC 138
NONREPUDIATION 138
NEW DIRECTIONS IN CRYPTOGRAPHY 138
NIEDERREITER CRYPTOSYSTEM 138
NCSC-TG-001 138
NCSC-TG-002 138
NCSC-TG-003 139
NCSC-TG-004 139
NCSC-TG-005 139
NCSC-TG-006 139
NCSC-TG-007 139
NCSC-TG-008 139
NCSC-TG-009 139
NCSC-TG-010 139
NCSC-TG-011 139
NCSC-TG-013 139
NCSC-TG-014 139
NCSC-TG-015 140
NCSC-TG-016 140
NCSC-TG-017 140
NCSC-TG-018 140
NCSC-TG-019 140
NCSC-TG-020 140
NCSC-TG-021 140
Êðàòêèé òîëêîâûé ñëîâàðü ïî èíôîðìàöèîííîé áåçîïàñíîñòè
© Copyright, 1998-2000, À.Â. Ëóêàöêèé 18
NCSC-TG-022 140
NCSC-TG-023 140
NCSC-TG-024 140
NCSC-TG-025 140
NCSC-TG-026 141
NCSC-TG-027 141
NCSC-TG-028 141
NCSC-TG-029 141
NCSC-TG-030 141
NEON ORANGE BOOK 141
O 142
ONE-TIME PAD 142
OUTPUT FEEDBACK 142
OFB 142
OBJECT SIGNING 142
ORANGE BOOK 142
OBJECT 142
OBJECT REUSE 142
OMBA-123 143
OPUS NOVUM 143
ONE-WAY FUNCTION 143
ONE-TIME SIGNATURE 143
OAKLEY 143
P 144
PKCS 144
PKCS #1 144
PKCS #3 144
PKCS #5 144
PKCS #6 144
PKCS #7 144
PKCS #8 144
PKCS #9 144
PKCS #10 145
PKCS #11 145
PUBLIC-KEY CRYPTOGRAPHY STANDARDS 145
PUBLIC KEY 145
PRIVATE KEY 145
PRIVACY ENHANCED MAIL 145
PEM 146
PEM-MIME 146
PCT 146
PRIVATE COMMUNICATION TECHNOLOGY 146
POINT-TO-POINT TUNNELING PROTOCOL 146
PPTP 146
PRINCIPAL 146
PREFERRED PRODUCTS LIST 147
PPL 147
PROCESS 147
PROTOCOL 147
Êðàòêèé òîëêîâûé ñëîâàðü ïî èíôîðìàöèîííîé áåçîïàñíîñòè
© Copyright, 1998-2000, À.Â. Ëóêàöêèé 19
PLAINTEXT 147
PUBLIC-KEY CRYPTOGRAPHY 147
PRIVACY ACT OF 1974 147
PURCHASE KEY ATTACK 147
PURPLE 147
POLYGRAPHIA 148
PROPAGATING CIPHER BLOCK CHAINING 148
PCBC 148
PLAINTEXT BLOCK CHAINING 148
PBC 148
PACKET-FILTERING FIREWALL 148
PROXY 148
PROXY SERVER 149
PASSWORD AUTHENTICATION PROTOCOL 149
PAP 149
PERSONAL INFORMATION EXCHANGE 149
PFX 149
PARTIAL KEY ESCROW 149
PASSWORD MANAGEMENT GUIDELINE 150
PINK BOOK 150
PURPLE BOOK 150
Q 151
QUANTUM CRYPTOGRAPHY 151
R 152
RSA 152
RC2 152
RC4 153
RC5 153
RISK ANALYSIS 153
RAINBOW SERIES 153
RECOVERY PLAN 153
RECOVERY PROCEDURES 153
REFERENCE MONITOR CONCEPT 153
REPUDATION 153
RUBBER HOSE CRYPTANALYSIS 154
RED 154
RUNNING KEY GENERATOR 154
RABIN SIGNATURE SCHEME 154
RSA-129 154
RDES 154
RADIUS 155
REMOTE AUTHENTICATION DIAL-IN USER SERVICE 155
REMANENCE 155
RAMP PROGRAM DOCUMENT 155
RED BOOK 155
S 156
SET 156
Êðàòêèé òîëêîâûé ñëîâàðü ïî èíôîðìàöèîííîé áåçîïàñíîñòè
© Copyright, 1998-2000, À.Â. Ëóêàöêèé 20
SECURE ELECTRONIC TRANSACTION 156
SSL 156
SECURE SOCKETS LAYER 156
S/WAN 156
SECURE WIDE AREA NETWORK 156
S\MIME 157
STREAM CIPHER 157
SKIPJACK 157
S1 157
SEAL 157
SOFTWARE-OPTIMIZED ENCRYPTION ALGORITHM 157
SCREENING EXTERNAL ACCESS LINK 158
SAFER 158
SECURE AND FAST ENCRYPTION ROUTINE 158
SHA 158
SHS 158
SECURE HYPERTEXT TRANSFER PROTOCOL 159
S-HTTP 159
SIMPLE KEY MANAGEMENT FOR INTERNET PROTOCOL 159
SKIP 159
SNIFFING 159
SPOOFING 160
SALAMI ATTACK 160
SECURITY POLICY 160
SECURITY CLEARANCE 160
SUBJECT 160
SECURE STATE 160
SECURITY FLAW 161
SECURITY HOLE 161
SECURITY KERNEL 161
SECURITY LEVEL 161
SECRET-KEY CRYPTOGRAPHY 161
SYMMETRIC CRYPTOGRAPHY 161
SIGABA 161
SUBTILITAS DE SUBTILITAE RERUM 161
SYNCHRONOUS STREAM CIPHER 161
SELF SYNCHRONOUS STREAM CIPHER 162
SELF ENFORCING PROTOCOL 162
SELF-AUTHENTICATING SIGNATURE SCHEME 162
SNDES 162
SECRET SHARING SCHEME 162
SHAMIRS SECRET SHARING SCHEME 162
SECURE COURIER 162
SECURITY ZONE 162
STATEFUL INSPECTION FIREWALL 163
SECURITY COORDINATION CENTER 163
SCC 163
SILVER BOOK 163
T 164
TRIPLE DES 164
TRAPDOOR 164
TROJAN HORSE 164
Êðàòêèé òîëêîâûé ñëîâàðü ïî èíôîðìàöèîííîé áåçîïàñíîñòè
© Copyright, 1998-2000, À.Â. Ëóêàöêèé 21
TRUSTED COMPUTING BASE 164
TCB 164
TEMPEST 164
THREAT 164
TRUSTED PATH 164
TRUSTED COMPUTER SECURITY EVALUATION CRITERIA 165
TCSEC 165
THE TRUSTED NETWORK INTERPRETATION OF DEPARTMENT OF DEFENSE TRUSTED
COMPUTER SYSTEM EVALUATION GUIDELINES 165
TIMESTAMPING 166
TIMED-RELEASE CRYPTOSYSTEM 166
TIMELOCK PUZZLES 166
TECHNICAL CRITERIA FOR EVALUATION OF COMMERCIAL SECURITY PRODUCTS
166
TRAP DOOR ONE-WAY FUNCTION 166
TESSERA 166
TERMINAL ACCESS CONTROL ACCESS SYSTEM 166
TACACS 167
TACACS+ 167
TRANSPORT LAYER SECURE PROTOCOL 167
TLSP 167
TRAFFIC ANALYSIS 167
TECHNICAL RATIONAL BEHIND CSC-STD-003-85: COMPUTER SECURITY
REQUIREMENTS
GUIDANCE FOR APPLYING THE DOD TCSEC IN SPECIFIC ENVIRONMENTS 167
TRUSTED PRODUCT EVALUATIONS A GUIDE FOR VENDORS 168
TRUSTED PRODUCT EVALUATION PROGRAM 168
TPEP 168
TNI 168
TRUSTED NETWORK ENVIRONMENTS GUIDELINE GUIDANCE FOR APPLYING THE TNI
168
TRUSTED PRODUCT EVALUATION QUESTIONNAIRE 168
TRUSTED UNIX WORKING GROUP (TRUSIX) RATIONALE FOR SELECTING ACCESS
CONTROL
LIST FEATURES FOR THE UNIX® SYSTEM 169
TRUSTED DATABASE MANAGEMENT SYSTEM INTERPRETATION OF THE TCSEC 169
TDI 169
TAN BOOK 169
TEAL GREEN BOOK 169
TURQUOISE BOOK 169
U 170
UNAUTHORIZED ACCESS 170
UNDENIABLE SIGNATURE SCHEME 170
V 171
VERIFICATION 171
VULNERABILITY 171
VIOLATOR 171
VIRTUAL PRIVATE NETWORK 171
VPN 171
VENICE BLUE BOOK 171
VIOLET BOOK 171
W 172
Êðàòêèé òîëêîâûé ñëîâàðü ïî èíôîðìàöèîííîé áåçîïàñíîñòè
WORM 172
WHITE BOOK 172
WHITENING 172
X 173
X.400 173
X.435 173
X.509 173
EXTENDED TERMINAL ACCESS CONTROL ACCESS SYSTEM 173
XTACACS 173
X-FORCE 173
Y 175
YELLOW BOOK 175
YELLOW-GREEN BOOK 175
5 176
5200.28-STD 176
ÑÏÈÑÎÊ ËÈÒÅÐÀÒÓÐÛ 177
ÓÊÀÇÀÒÅËÜ
|