expand for answer

System integrity

Attribute of an information system when it performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system. The attribute of an IS when it performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.


Similar items:
Deliberate planting of apparent flaws in an information system for the purpose of detecting attempted penetrations. The deliberate planting of apparent flows in a system to invite penetrations.
[view]
A channel that conveys information by altering the performance of a system component or modifying a resource’s timing in a predictable manner. A covert channel in which one process signals information to another by modulating its own use of system resources in such a way that this manipulation affects the real response time observed by the second process. Covert channel in which one process signals information to another process by modulating its own use of system resources (e. g. , central processing unit time) in such a way that this manipulation affects the real response time observed by the second process.
[view]
A data manipulation language (DML) provides the necessary commands for all database operations, including storing, retrieving, updating, and deleting database records. The database programming language that allows users to interact with the data contained within the schema.
[view]
Type of incident in which unauthorized access to data results from hardware or software failure. Unauthorized and usually inadvertent access to data resulting from a hardware, software, or firmware failure in the computer system.
[view]
A confinement technique in which an attribute called a domain is associated with each subject and another attribute called a type is associated with each object. A matrix specifies whether a particular mode of access to objects of a type is granted or denied to subjects in a domain.
[view]


There are no comments yet.

Authentication required

You must log in to post a comment.

Log in