expand for answer

Fail soft

Selective termination of affected nonessential processing when hardware or software failure is determined to be imminent. The selective termination of nonessential processing affected by a hardware, software, or firmware failure in a computer system.


Similar items:
Methodology used to detect imminent hardware or software failure and provide fail safe or fail soft recovery. The methodology used to detect and provide failsafe or failsoft recovery from hardware, software, or firmware failure in a computer system.
[view]
Automatic protection of programs and/or processing systems when hardware or software failure is detected. The automatic termination and protection of programs or other processing operations when a hardware, software, or firmware failure is detected in a computer system.
[view]
The term “computer forensics” was coined in 1991 in the first training session held by the International Association of Computer Specialists (IACIS) in Portland, Oregon. Since then, computer forensics has become a popular topic in computer security circles and in the legal community. Like any other forensic science, computer forensics deals with the application of law to a science. In this case, the science involved is computer science and some refer to it as Forensic Computer Science. Computer forensics has also been described as the autopsy of a computer hard disk drive because specialized software tools and techniques are required to analyze the various levels at which computer data is stored after the fact. Computer forensics deals with the preservation, identification, extraction, and documentation of computer evidence. The field is relatively new to the private sector, but it has been the mainstay of technologyrelated investigations and intelligence gathering in law enforcement and military agencies since the mid1980s. Like any other forensic science, computer forensics involves the use of sophisticated technology tools and procedures that must be followed to guarantee the accuracy of the preservation of evidence and the accuracy of results concerning computer evidence processing. Typically, computer forensic tools exist in the form of computer software.
[view]
Type of incident in which unauthorized access to data results from hardware or software failure. Unauthorized and usually inadvertent access to data resulting from a hardware, software, or firmware failure in the computer system.
[view]
Hardware, firmware, and software elements of a trusted computing base implementing the reference monitor concept. Security kernel must mediate all accesses, be protected from modification, and be verifiable as correct. The central part of a computer system (hardware, software, or firmware) that implements the fundamental security procedures for controlling access to system resources. The core set of operating system services that handles all user/application requests for access to system resources.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in