Читаем CISSP Practice полностью

An error resulting from the expression of a command in a way that violates a program’s syntax rules. Syntax rules specify precisely how a command, statement, or instruction must be given to the computer so that it can recognize and process the instruction correctly.

Syslog

A protocol that specifies a general log entry format and a log entry transport mechanism. Log facility is the message type for a syslog message.

System

A discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. A generic term used for briefness to mean either a major/minor application (MA) or a general support system (GSS).

System administrator

A person who manages a multiuser computer system, including its operating system and applications, and whose responsibilities are similar to that of a network administrator. A system administrator would perform systems programmer activities with regard to the operating system and network control programs.

System availability

(1) A timely, reliable access to data, system, and information services for authorized users. (2) A measure of the amount of time that the system is actually capable of accepting and performing a user’s work. (3) The availability of communication ports and the amount or quantity of service received in a given period. (4) Can be viewed as a component of system reliability. The availability of a computer system can be expressed as a percentage in several ways, as follows:

Availability = (Uptime)/(Uptime + Downtime) × 100

Availability = (Available time/Scheduled time) × 100

Availability = [(MTTF)/(MTTF + MTTR)] × 100

Availability = (MTTF/MTBF) × 100

System confidentiality

Assurance that information is not disclosed to unauthorized individuals, processes, or devices.

System development life cycle (SDLC)

A systematic process for planning, analyzing, designing, developing, implementing, operating, and maintaining a computer-based application system. The scope of activities associated with a system, encompassing the system’s initiation, development and acquisition, implementation, operation and maintenance, and ultimately its disposal that instigates another system initiation.

System development methodologies

Methodologies developed through software engineering to manage the complexity of system development. Development methodologies include software engineering aids and high-level design analysis tools.

System high

The highest security level supported by a system at a particular time or in a particular environment (e.g., military/weapon systems, aircraft systems, and nuclear systems).

System integrity

(1) Quality of a system or product reflecting the logical correctness and reliability of the operating system; verification that the original contents of information have not been altered or corrupted. (2) The quality that a system has when it performs its intended function in an unimpaired manner, free from unauthorized manipulation of the system, whether intentional or accidental.

System integrity exposure

A condition that exists when there is a potential of one or more programs that can bypass the installation’s control and (a) circumvent or disable store or fetch protection, (b) access a protected resource, and (c) obtain control in authorized (supervisor) state. This condition can lead to compromise of systems protection mechanisms and data integrity.

System inventory

Organizations require a system inventory in place. All systems in the inventory should be categorized as a first step in support of the security planning activity and eventually in the assessment of the security controls implemented on the system.

System life

A projection of the time period that begins with the installation of a system resource (e.g., software or hardware) and ends when the organization’s need for that resource has terminated.

System low

The lowest security level supported by a computer system at a particular time or in a particular environment.

System manager

The IT manager who is responsible for the operation of a computer system.

System parameter

A factor or property whose value determines a characteristic or behavior of the system.

System reliability

The terms system reliability and system availability are closely related and often used (although incorrectly) synonymously. For example, a system that fails frequently but is restarted quickly has high availability even though its reliability is low. To distinguish between the two, reliability can be thought of as the quality of service and availability as the quantity of service. System reliability is measured in terms of downtime hours in a given period of time.

System resilience

Перейти на страницу:

Похожие книги

100 абсолютных законов успеха в бизнесе
100 абсолютных законов успеха в бизнесе

Почему одни люди преуспевают в бизнесе больше других? Почему одни предприятия процветают, в то время как другие терпят крах? Известный лектор и писатель по вопросам бизнеса нашел ответы на эти очень трудные вопросы. В своей книге он представляет набор принципов, или `универсальных законов`, которые лежат в основе успеха деловых людей всего мира. Практические рекомендации Трейси имеют вид 100 доступных для понимания и простых в применении законов, относящихся к важнейшим сферам труда и бизнеса. Он также приводит примеры из реальной жизни, которые наглядно иллюстрируют, как работает каждый из законов, а также предлагает читателю упражнения по применению этих законов в работе и жизни.

Брайан Трейси

Деловая литература / Маркетинг, PR, реклама / О бизнесе популярно / Финансы и бизнес