expand for answer

Separation of duties

Concept of having more than one person required to complete a task. (Source: Wikipedia)


Similar items:
A security technique in which two or more entities separately hold data items that individually convey no knowledge of the information that results from combining the items. A condition under which two or more entities separately have key components that individually convey no knowledge of the plaintext key that will be produced when the key components are combined in the cryptographic module. Separation of data or information into two or more parts, each part constantly kept under control of separate authorized individuals or teams so that no one individual or team will know the whole data. The specific application of the ideas of separation of duties and two-man control into a single solution. The basic idea is that the information or privilege required to perform an operation is divided among multiple users. This ensures that no single person has sufficient privileges to compromise the security of the environment.
[view]
A concept that ensures that any behavior will affect only the memory and resources associated with the process. The separation of users and processes in a computer system from one another, as well as from the protection controls of the operating system.
[view]
Internet Engineering Task ForceInternet Engineering Task Force. Internet Engineering Task Force; a public consortium that develops standards for the Internet.
[view]
A common practice to prevent any single subject from being able to circumvent or disable security mechanisms. By dividing core administration or high-authority responsibilities among several subjects, no one subject
[view]
A system is operating in the controlled security mode when at least some users with access to the system have neither a security clearance nor a needtoknow for all classified material contained in the system. However, the separation and control of users and classified material on the basis, respectively, of security clearance and security classification are not essentially under operating system control as in the multilevel security mode.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in