expand for answer

Mode of operation

A classification for systems that execute in a similar fashion and share distinctive operational characteristics (e. g. , Production, DSS, online, and Interactive). Description of the conditions under which an information system operates based on the sensitivity of information processed and the clearance levels, formal access approvals, and needtoknow of its users. Four modes of operation are authorized for processing or transmitting information: dedicated mode, systemhigh mode, compartmented/partitioned mode, and multilevel mode.


Similar items:
MAC is a means of restricting access to data based on varying degrees of security requirements for information contained in the objects. A policybased means of restricting access to objects based on the sensitivity (as represented by a label) of the information contained in the objects and the formal authorization (access control privileges) of subjects to access information of such sensitivity. Means of restricting access to objects based on the sensitivity of the information contained in the objects and the formal authorization (i. e. , clearance, formal access approvals, and needtoknow) of subjects to access information of such sensitivity. (. See discretionary access control. )
[view]
INFOSec mode of operation wherein each user with direct or indirect access to a system, its peripherals, remote terminals, or remote hosts has all of the following: (1) valid security clearance for the most restricted information processed in the system; (2) formal access approval and signed nondisclosure agreements for that information which a user is to have access; and (3) valid needtoknow for information that a user is to have access. Mode of operation wherein each user with direct or indirect access to a system, its peripherals, remote terminals, or remote hosts has all of the following: (a) valid security clearance for the most restricted information processed in the system; (b) formal access approval and signed nondisclosure agreements for that information which a user is to have access; and (c) valid needtoknow for information which a user is to have access.
[view]
Information system security mode of operation wherein each user, with direct or indirect access to the information system, its peripherals, remote terminals, or remote hosts, has all of the following: a. valid security clearance for all information within an information system; b. formal access approval and signed nondisclosure agreements for all the information stored and/or processed (including all compartments, subcompartments and/or special access programs); and c. valid needto know for some of the information contained within the information system. IS security mode of operation wherein each user, with direct or indirect access to the IS, its peripherals, remote terminals, or remote hosts, has all of the following: (a) valid security clearance for all information within an IS; (b) formal access approval and signed nondisclosure agreements for all the information stored and processed (including all compartments and special access programs); and (c) valid needtoknow for some of the information contained within the IS. See system-high security mode.
[view]
INFOSec mode of operation wherein all the following statements are satisfied concerning the users who have direct or indirect access to the system, its peripherals, remote terminals, or remote hosts:INFOSEC mode of operation wherein all the following statements are satisfied concerning the users who have direct or indirect access to the system, its peripherals, remote terminals, or remote hosts: a. some users do not have a valid security clearance for all the information processed in the information system; b. all users have the proper security clearance and appropriate formal access approval for that information to which they have access; and c. all users have a valid needtoknow only for information to which they have access. See multilevel security mode.
[view]
information system security mode of operation wherein each user, with direct or indirect access to the system, its peripherals, remote terminals, or remote hosts, has all of the following: a. valid security clearance for all information within the system; b. formal access approval and signed nondisclosure agreements for all the information stored and/or processed (including all compartments, subcompartments, and/or special access programs); and c. valid needtoknow for all information contained within the information system. When in the dedicated security mode, a system is specifically and exclusively dedicated to and controlled for the processing of one particular type or classification of information, either for fulltime operation or for a specified period of time. See dedicated security mode. The operation of a computer system such that the central computer facility, connected peripheral devices, communications facilities, and all remote terminals are used and controlled exclusively by the users or groups of users for the processing of particular types and categories of information.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in