expand for answer

Multilevel Security Mode

A system that is authorized to process information at more than one level of security even when all system users do not have appropriate clearances or a need to know for all information processed by the system.


Similar items:
Concept of processing information with different classifications and categories that simultaneously permits access by users with different security clearances and denies access to users who lack authorization. (. See cross domain solution. )Concept of processing information with different classifications and categories that simultaneously permits access by users with different security clearances, but prevents users from obtaining access to information for which they lack authorization.
[view]
INFOSec mode of operation wherein all the following statements are satisfied concerning the users who have direct or indirect access to the system, its peripherals, remote terminals, or remote hosts:INFOSEC mode of operation wherein all the following statements are satisfied concerning the users who have direct or indirect access to the system, its peripherals, remote terminals, or remote hosts: a. some users do not have a valid security clearance for all the information processed in the information system; b. all users have the proper security clearance and appropriate formal access approval for that information to which they have access; and c. all users have a valid needtoknow only for information to which they have access. See multilevel security mode.
[view]
A class of systems containing information with different sensitivities that simultaneously permits access by users with different security clearances and needstoknow, but prevents users from obtaining access to information for which they lack authorization.
[view]
A classification for systems that execute in a similar fashion and share distinctive operational characteristics (e. g. , Production, DSS, online, and Interactive). Description of the conditions under which an information system operates based on the sensitivity of information processed and the clearance levels, formal access approvals, and needtoknow of its users. Four modes of operation are authorized for processing or transmitting information: dedicated mode, systemhigh mode, compartmented/partitioned mode, and multilevel mode.
[view]
Environment providing sufficient assurance that applications and equipment are protected against the introduction of malicious logic during an information system life cycle. Closed security is based upon a system’s developers, operators, and maintenance personnel having sufficient clearances, authorization, and configuration control.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in