expand for answer

Systems security

There are three parts to systems security: (1) Computer Security (COMPUSec) is composed of measures and controls that protect an AIS against denialofservice, unauthorized disclosure, modification, or destruction of AIS and data (information). (2) Communications Security (COMSec) is measures and controls taken to deny unauthorized persons information derived from telecommunications of the U. S. government. Government communications regularly travel by computer networks, telephone systems, and radio calls. (3) Information Systems Security (INFOSec) is controls and measures taken to protect telecommunications systems, automated information systems, and the information they process, transmit, and store.


Similar items:
(1) The combination of COMSec and COMPUSec the protection of information against unauthorized disclosure, transfer, modification, or destruction, whether accidental or intentional. (2) Protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit, and against denialofservice to authorized users, including those measures necessary to detect, document, and counter such threats. Information Systems Security
[view]
(COMSEC) Measures and controls taken to deny unauthorized individuals information derived from telecommunications and to ensure the authenticity of such telecommunications. Communications security includes cryptosecurity, transmission security, emission security, and physical security of COMSEC material.
[view]
Protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users, including those measures necessary to detect, document, and counter such threats. The protection of information systems against unauthorized access to or modification of information, whether in storage, processing, or transit, and against the denialofservice to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats.
[view]
The protection that ensures the authenticity of telecommunications and that results from the application of measures taken to deny unauthorized persons access to valuable information that might be derived from the acquisition of telecommunications.
[view]
Individual designated by proper authority to be responsible for the receipt, transfer, accounting, safeguarding, and destruction of COMSEC material assigned to a COMSEC account. Person designated by proper authority to be responsible for the receipt, transfer, accounting, safeguarding, and destruction of COMSec material assigned to a COMSec account.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in