expand for answer

Centralized Alarm System

An alarm system that signals a remote or centralized monitoring station when the alarm is triggered.


Similar items:
An additional function that can be added to either local or centralized alarm systems. The purpose of an auxiliary alarm system is to notify local police or fire services when an alarm is triggered.
[view]
A function that collects the security alarm messages, translates them into security alarm records, and writes them to the security alarm log.
[view]
Security measure designed to establish the validity of a transmission, message, or originator, or a means of verifying an individual's authorization to receive specific categories of information. The act of identifying or verifying the eligibility of a station, originator, or individual to access specific categories of information. Typically, a measure designed to protect against fraudulent transmissions by establishing the validity of a transmission, message, station, or originator. The process of verifying or testing that the identity claimed by a subject is valid.
[view]
(1) Capability for data transmission in only one direction at a time between a sending station and a receiving station. (2) A circuit designed for data transmission in both directions but not at the same time.
[view]
Information system security mode of operation wherein each user, with direct or indirect access to the information system, its peripherals, remote terminals, or remote hosts, has all of the following: a. valid security clearance for all information within an information system; b. formal access approval and signed nondisclosure agreements for all the information stored and/or processed (including all compartments, subcompartments and/or special access programs); and c. valid needto know for some of the information contained within the information system. IS security mode of operation wherein each user, with direct or indirect access to the IS, its peripherals, remote terminals, or remote hosts, has all of the following: (a) valid security clearance for all information within an IS; (b) formal access approval and signed nondisclosure agreements for all the information stored and processed (including all compartments and special access programs); and (c) valid needtoknow for some of the information contained within the IS. See system-high security mode.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in