داستان آبیدیک

security categorization


فارسی

1 عمومی:: طبقه بندی امنیتی

PL-8 Information Security Architecture Not Selected PL-8 PL-8 PS-1 Personnel Security Policy and Procedures PS-1 PS-1 PS-1 PS-2 Position Risk Designation PS-2 PS-2 PS-2 PS-3 Personnel Screening PS-3 PS-3 PS-3 PS-4 Personnel Termination PS-4 PS-4 PS-4 (2) PS-5 Personnel Transfer PS-5 PS-5 PS-5 PS-6 Access Agreements PS-6 PS-6 PS-6 PS-7 Third-Party Personnel Security PS-7 PS-7 PS-7 PS-8 Personnel Sanctions PS-8 PS-8 PS-8 RA-1 Risk Assessment Policy and Procedures RA-1 RA-1 RA-1 RA-2 Security Categorization RA-2 RA-2 RA-2 RA-3 Risk Assessment RA-3 RA-3 RA-3 RA-5 Vulnerability Scanning RA-5 RA-5 (1) (2) RA-5 (1) (2) (4) (5) (5) SA-1 System and Services Acquisition Policy and SA-1 SA-1 SA-1 Procedures SA-2 Allocation of Resources SA-2 SA-2 SA-2 SA-3 System Development Life Cycle SA-3 SA-3 SA-3 SA-4 Acquisition Process SA-4 (10) SA-4 (1) (2) SA-4 (1) (2) (9) (9) (10) (10) SA-5 Information System Documentation SA-5 SA-5 SA-5 SA-8 Security Engineering Principles Not Selected SA-8 SA-8 SA-9 External Information System Services SA-9 SA-9 (2) SA-9 (2) SA-10 Developer Configuration Management Not Selected SA-10 SA-10 SA-11 Developer Security Testing and Evaluation Not Selected SA-11 SA-11 SA-12 Supply Chain Protection Not Selected Not Selected SA-12 SA-15 Development Process, Standards, and Not Selected Not Selected SA-15 Tools SA-16 Developer-Provided Training Not Selected Not Selected SA-16 SA-17 Developer Security Architecture and Design Not Selected Not Selected SA-17 SC-1 System and Communications Protection SC-1 SC-1 SC-1 Policy and Procedures SC-2 Application Partitioning Not Selected SC-2 SC-2 SC-3 Security Function Isolation Not Selected Not Selected SC-3 SC-4 Information in Shared Resources Not Selected SC-4 SC-4 SC-5 Denial of Service Protection SC-5 SC-5 SC-5 SC-7 Boundary Protection SC-7 SC-7 (3) (4) (5) SC-7 (3) (4) (5) (7) (18) (7) (8) (18) (21) SC-8 Transmission Confidentiality and Integrity Not Selected SC-8 (1) SC-8 (1) SC-10 Network Disconnect Not Selected SC-10 SC-10 SC-12 Cryptographic Key Establishment and SC-12 SC-12 SC-12 (1) Management SC-13 Cryptographic Protection SC-13 SC-13 SC-13 SC-15 Collaborative Computing Devices SC-15 SC-15 SC-15 SC-17 Public Key Infrastructure Certificates Not Selected SC-17 SC-17 SC-18 Mobile Code Not Selected SC-18 SC-18 SC-19 Voice Over Internet Protocol Not Selected SC-19 SC-19 SC-20 Secure Name /Address Resolution Service SC-20 SC-20 SC-20 (Authoritative Source) SC-21 Secure Name /Address Resolution Service SC-21 SC-21 SC-21 (Recursive or Caching Resolver) SC-22 Architecture and Provisioning for SC-22 SC-22 SC-22 Name/Address Resolution Service SC-23 Session Authenticity Not Selected SC-23 SC-23 SC-24 Fail in Known State Not Selected SC-24 SC-24 SC-28 Protection of Information at Rest Not Selected SC-28 SC-28 SC-39 Process Isolation SC-39 SC-39 SC-39 SC-41 Port and I/O Device Access SC-41 SC-41 SC-41 SI-1 System and Information Integrity Policy and SI-1 SI-1 SI-1 Procedures SI-2 Flaw Remediation SI-2 SI-2 (2) SI-2 (1) (2) SI-3 Malicious Code Protection SI-3 SI-3 (1) (2) SI-3 (1) (2) SI-4 Information System Monitoring SI-4 SI-4 (2) (4) SI-4 (2) (4) (5) (5) SI-5 Security Alerts, Advisories, and Directives SI-5 SI-5 SI-5 (1) SI-6 Security Function Verification Not Selected Not Selected SI-6 SI-7 Software, Firmware, and Information Not Selected SI-7 (1) (7) SI-7 (1) (2) (5) Integrity (7) (14) SI-8 Spam Protection Not Selected SI-8 (1) (2) SI-8 (1) (2) This process is known as security categorization.

واژگان شبکه مترجمین ایران


معنی‌های پیشنهادی کاربران

نام و نام خانوادگی
شماره تلفن همراه
متن معنی یا پیشنهاد شما
Captcha Code