expand for answer

Transparency

A characteristic of a service, security control, or access mechanism that is unseen by users. Transparency is often a desirable feature for security controls. The characteristic of a service, security control, or access mechanism that ensures that it is unseen by users. Transparency is often a desirable feature for security controls. The more transparent a security mechanism is, the less likely a user will be able to circumvent it or even be aware that it exists.


Similar items:
An activity used to test the strength and effectiveness of deployed security measures with an authorized attempted intrusion attack. Penetration testing should be performed only with the consent and knowledge of the management staff. Security testing in which evaluators attempt to circumvent the security features of a system based on their understanding of the system design and implementation. Security testing in which the evaluators attempt to circumvent the security features of a system based on their understanding of the system design and implementation. The evaluators may be assumed to use all system design and implementation documentation, which may include listings of system source code, manuals, and circuit diagrams. The evaluators work under no constraints other than those applied to ordinary users or implementers of untrusted portions of the component.
[view]
Hidden software or hardware mechanism used to circumvent security controls. Synonymous with trap door.
[view]
A common practice to prevent any single subject from being able to circumvent or disable security mechanisms. By dividing core administration or high-authority responsibilities among several subjects, no one subject
[view]
A layered approach to security. Multiple layers of security are implemented, requiring attackers to circumvent several security controls to be successful.
[view]
A law that establishes the prohibition of attempts to circumvent copyright protection mechanisms placed on a protected work by the copyright holder and limits the liability of Internet service providers when their circuits are used by criminals violating the copyright law.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in