upload
Alliance for Telecommunications Industry Solutions
Industrie: Telecommunications
Number of terms: 29235
Number of blossaries: 0
Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
1. See aliasing. 2. In networking, one of a set of domain names of an Internet resource. 3. Synonyms personal number, UPT number.
Industry:Telecommunications
1. Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information. 2. A security measure designed to protect a communications system against acceptance of a fraudulent transmission or simulation by establishing the validity of a transmission, message, or originator. 3. Evidence by proper signature or seal that a document is genuine and official. 4. The verification of a claimed identity. Example: By the use of a password. 5. The process by which the identity of an entity is established. 6. See data origin authentication, and peer entity authentication. Note: In this part of 7498 the term "authentication" is not used in connection with data integrity; the term "data integrity" is used instead. The property of knowing that the data received is the same as the data that was sent, and that the claimed sender is in fact the actual sender.
Industry:Telecommunications
1. Representation of facts, concepts, or instructions in a formalized manner suitable for communication, interpretation, or processing by humans or by automatic means. Any representations such as characters or analog quantities to which meaning is or might be assigned. 2. Representations of facts, concepts or instructions in a formalized manner suitable for communication, interpretation or processing by human and/or automatic means. Note: The interpretation of data as information requires a convention (e. G. Language. ) 3. Information with a specific physical representation.
Industry:Telecommunications
1. Physical equipment as opposed to programs, procedures, rules, and associated documentation. 2. The generic term dealing with physical items as distinguished from its capability or function such as equipment, tools, implements, instruments, devices, sets, fittings, trimmings, assemblies, subassemblies, components, and parts. The term is often used in regard to the stage of development, as in the passage of a device or component from the design stage into the hardware stage as the finished object. 3. In data automation, the physical equipment or devices forming a computer and peripheral components. 4. Physical equipment used in data processing as opposed to programs, procedures, rules, and associated documentation.
Industry:Telecommunications
1. Pertaining to communication with a data processing facility from a remote location or facility through a data link. 2. A PABX service feature that allows a user at a remote location to access by telephone PABX features, such as access to wide area telephone service (WATS) lines. Note: For remote access, individual authorization codes are usually required.
Industry:Telecommunications
1. Permission for a subject to access a particular object for a specific type of operation. Note: An example of an access right is the permission for a process to read a file but not write to it. 2. Authorization of access. Notes: A Access rights may be more or less explicit, both in the granularity of definition of subjects and objects used in implementing the security policy and in authorization of different types of access (eg read, write, execute,) Within a given context (for example within an Electronic Security Environment or a database) access rights exist insofar as they are not denied. See also: Need-to-Know, Least Privilege.
Industry:Telecommunications
1. Of classified or sensitive data, the degree to which the data have not been compromised; i. E. , have not been made available or disclosed to unauthorized individuals, processes, or other entities. 2. Assurance that information is not disclosed to unauthorized persons, processes, or devices. 3. A property by which information relating to an entity or party is not made available or disclosed to unauthorized individuals, entities, or processes. 3. The prevention of the unauthorized disclosure of information. 4. A security property of an object that prevents:- its existence being known and/or- its content being known. This property is relative to some subject population and to some agreed degree of security. 5. Assurance that information is not disclosed to inappropriate entities or processes. 6. The property that information is not made available or disclosed to unauthorized individuals, entities, or processes. 7. The prevention of the unauthorized disclosure of information. 8. The property that the existence of an object and/or its contents is not made available or disclosed to unauthorized subjects.
Industry:Telecommunications
1. Of a data or information processing system, a threat of disclosure of information without changing the state of the system. Note: An example of a passive threat is one that could result in the recovery of sensitive information through the unauthorized interception of a data transmission. 2. The threat of unauthorized disclosure of information without changing the state of the system.
Industry:Telecommunications
1. Intelligible data, the semantic content of which is available. 2. Synonym plain text.
Industry:Telecommunications
1. Information, the loss, misuse, or unauthorized access to or modification of, which could adversely affect the national interest or the conduct of federal programs, or the privacy to which individuals are entitled under 5 U. S. C. Section 552a (the Privacy Act,) but that has not been specifically authorized under criteria established by an Executive Order or an Act of Congress to be kept classified in the interest of national defense or foreign policy. (Systems that are not national security systems, but contain sensitive information, are to be protected in accordance with the requirements of the Computer Security Act of 1987 (P. L. 100-235. )) 2. Information that, as determined by a competent authority, must be protected because its unauthorized disclosure, alteration, loss, or destruction will at least cause perceivable damage to someone or something.
Industry:Telecommunications