expand for answer

Reserve keying material

Key held to satisfy unplanned needs. (. See contingency key. )


Similar items:
Key held for use under specific operational conditions or in support of specific contingency plans. (. See reserve keying material. )
[view]
<p>(1) A security principle stating that individuals must be able to be identified. With accountability, violations or attempted violations can be traced to individuals who can be held responsible for their actions. </p><p>(2) The ability to map a given activity or event back to the responsible party; the property that ensures that the actions of an entity can be traced to that entity. </p><p>(IS) Process of tracing information system activities to a responsible source. </p><p>(COMSEC) Principle that an individual is entrusted to safeguard and control equipment, keying material, and information and is answerable to proper authority for the loss or misuse of that equipment or information. </p><p>The process of holding someone responsible (accountable) for something. In this context, accountability is possible if a subject’s identity and actions can be tracked and verified.</p>
[view]
Plans for emergency response, backup operations, and postdisaster recovery maintained by a computer information processing facility as a part of its security program.
[view]
Techniques that are employed to eliminate, reduce, or mitigate risk, such as inherent safe and secure (re)design techniques/features, alerts, warnings, operational procedures, instructions for use, training, and contingency plans.
[view]
Procedure by which a distant cryptoequipment is rekeyed electrically, with specific actions required by the receiving terminal operator. Synonymous with cooperative remote rekeying. (Also . See automatic remote keying. )
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in