- Industrie: Telecommunications
- Number of terms: 29235
- Number of blossaries: 0
- Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
The physically protected enclosure (e. G. , room or device) and its contents where cryptographic elements (i.e., cryptographic hardware, software, firmware, keys, or initialization vectors) reside.
Industry:Telecommunications
The physical, procedural and personnel security controls imposed by a developer on his Development Environment.
Industry:Telecommunications
The physical law stating that irradiance, i.e., the power per unit area in the direction of propagation, of a spherical wavefront varies inversely as the square of the distance from the source, assuming there are no losses caused by absorption or scattering. Note: For example, the power radiated from a point source, e. G. , an omnidirectional isotropic antenna, or from any source at very large distances from the source compared to the size of the source, must spread itself over larger and larger spherical surfaces as the distance from the source increases. Diffuse and incoherent radiation are similarly affected.
Industry:Telecommunications
The physical configuration, i.e., interconnection, of network elements, e. G. , cable paths, switches, concentrators. Note: Physical topology is in contrast to logical topology. For example, a logical loop may consist of a physical star configuration, or a physical loop.
Industry:Telecommunications
The physical changing of circuits or lines from one configuration to another.
Industry:Telecommunications
The phenomenon stating that, for a category size of 365 (the number of days in a year,) after only 23 people are gathered, the probability is greater than 0. 5 that at least two people have a common birthday (month and day. ) Note: The birthday phenomenon applied to DES encryption means that where category size is 264, this same probability of a repeat (match) occurs at approximately r=232. The theory behind this principle applies that for a 64-bit block encryption operation with a fixed key, if one has a text dictionary of 232 plaintext/ciphertext pairs and 232 blocks of ciphertext produced from random input, then it should be expected that one block of unknown ciphertext will be found in the dictionary.
Industry:Telecommunications
The phases of development and operation of a system from the initial concept to final disposal.
Industry:Telecommunications
The phase shift of electromagnetic signals associated with daily changes in the ionosphere. Note 1: The major changes usually occur during the period of time when sunrise or sunset is present at critical points along the path. Note 2: Significant phase shifts may occur on paths wherein a reflection area of the path is subject to a large tidal range. Note 3: In cable systems, significant phase shifts can be occasioned by diurnal temperature variance.
Industry:Telecommunications
The phase of a data call during which data may be transferred between data terminal equipments (DTEs) that are interconnected via the network. Note: The data phase of a data call corresponds to the information transfer phase of an information transfer transaction.
Industry:Telecommunications
The person ultimately responsible for the production and enforcement of a System Security Policy. See also: System Administrator, System Security Officer.
Industry:Telecommunications