Automated information systems security
- Automated information systems security
In telecommunication, the term automated information systems security refers to measures and controls that ensure confidentiality, integrity, and availability of the information processed and stored by automated information systems. The unauthorized disclosure, modification, or destruction may be accidental or intentional.
Automated information systems security includes consideration of all hardware and software functions, characteristics and features; operational procedures; accountability procedures; and access controls at the central computer facility, remote computer, and terminal facilities; management constraints; physical structures and devices, such as computers, transmission lines, and power sources; and personnel and communications controls needed to provide an acceptable level of risk for the automated information system and for the data and information contained in the system. Automated information systems security also includes the totality of security safeguards needed to provide an acceptable protection level for an automated information system and for the data handled by an automated information system.
In INFOSEC automated information systems security is a synonym for computer security.
References
*Federal Standard 1037C
Wikimedia Foundation.
2010.
Look at other dictionaries:
Information systems — The term information system (IS) sometimes refers to a system of persons, data records and activities that process the data and information in an organization, and it includes the organization s manual and automated processes. Computer based… … Wikipedia
Automated information system — The term automated information system means an assembly of computer hardware, software, firmware, or any combination of these, configured to accomplish specific information handling operations, such as communication, computation, dissemination,… … Wikipedia
Information technology security audit — A computer security audit is a manual or systematic measurable technical assessment of a system or application. Manual assessments include interviewing staff, performing security vulnerability scans, reviewing application and operating system… … Wikipedia
Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer. The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… … Universalium
Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… … Wikipedia
NATO Communications and Information Systems Services Agency — NATO Communication and Information Systems Services Agency Shield of NCSA Type NATO agency Headquarters Mons, Belgium Website … Wikipedia
Department of Defense Information Technology Security Certification and Accreditation Process — The Department of Defense Information Assurance Certification and Accreditation Process (DIACAP) is a process defined by the United States Department of Defense (DoD) for managing risk. DIACAP replaced the former process, known as DITSCAP… … Wikipedia
Information technology audit — An information technology audit, or information systems audit, is an examination of the controls within an Information technology (IT) infrastructure. An IT audit is the process of collecting and evaluating evidence of an organization s… … Wikipedia
Automated Tissue Image Systems — (ATIS) are computer controlled automatic test equipment (ATE) systems classified as medical device and used as pathology laboratory tools (tissue based cancer diagnostics) to characterize a stained tissue sample embedded on a bar coded glass… … Wikipedia
Information privacy — Information privacy, or data privacy is the relationship between collection and dissemination of data, technology, the public expectation of privacy, and the legal and political issues surrounding them. Privacy concerns exist wherever personally… … Wikipedia