Các bài viết cũ

Một số thuật ngữ về an toàn thông tin từ A- gần “Z”

Access

Access Control

Accreditation/Approval

Adequate Security

ADP

Application

Application Owner

Audit

Authenticate/Authentication

Authenticated user

Authorization

Authorized Person

Back-up

Back-up Operation

C2

Certification

Channel

Cipher

Classification

Clear or clearing (MIS Storage Media)

Clipper

Compromise

Computer Security

Confidentiality

Configuration Management (CM)

Contingency Plan

Controlled Access Protection (C2)

Conventional Encryption

COTS

Countermeasures

Cracker

DAC

DASD (Direct Access Storage Device)

Data

Data Encryption Standard (DES)

Data integrity

DES

Denial of Service

Department of Defense (DOD) Trusted Computer System Evaluation Criteria

Digital Signature Standard

Disaster Recovery Plan

Discretionary Access Control (DAC)

DSS

Emergency Response

Encryption

Evaluation

Firewall

Gateway

Hack

Hacker

information Security

Identification

Integrity

Internet

Intruder

Key Distribution Center

Kerberos

LAN (Local Area Network)

Least Privilege

Malicious Code

Management Information System (MIS)

MIS Security

Microprocessor

Network

Network Security

Nonvolatile Memory Units

Object

Object Reuse

Online

Orange book

Overwrite Procedure

Password

Personnel Security

Physical Security

Read

Recovery

Residual Risk

Risk Analysis

Risk Assessment

Risk Management

ROM

RSA

Safeguards

Security Incident

Security Policy

Security Requirements

Security Specifications

Security Violation

Site

Skipjack

Standard Security Procedures

Standalone System

Symmetric Encryption

System

System Integrity

TCSEC

Test Condition

Test Data

Test procedure (Script)

Test program

Threat

Security Safeguards (countermeasures)

Trusted Computer Base (TCB)

Trusted Computing System

UPS (Uninterruptible Power Supply)

Verification

Virus

Vulnerability

WAN (Wide Area Network)

WWW

World Wide Web

Worm

Write

Read the rest of this entry