An error resulting from the expression of a command in a way that violates a program’s syntax rules. Syntax rules specify precisely how a command, statement, or instruction must be given to the computer so that it can recognize and process the instruction correctly.
A protocol that specifies a general log entry format and a log entry transport mechanism. Log facility is the message type for a syslog message.
A discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. A generic term used for briefness to mean either a major/minor application (MA) or a general support system (GSS).
A person who manages a multiuser computer system, including its operating system and applications, and whose responsibilities are similar to that of a network administrator. A system administrator would perform systems programmer activities with regard to the operating system and network control programs.
(1) A timely, reliable access to data, system, and information services for authorized users. (2) A measure of the amount of time that the system is actually capable of accepting and performing a user’s work. (3) The availability of communication ports and the amount or quantity of service received in a given period. (4) Can be viewed as a component of system reliability. The availability of a computer system can be expressed as a percentage in several ways, as follows:
Availability = (Uptime)/(Uptime + Downtime) × 100
Availability = (Available time/Scheduled time) × 100
Availability = [(MTTF)/(MTTF + MTTR)] × 100
Availability = (MTTF/MTBF) × 100
Assurance that information is not disclosed to unauthorized individuals, processes, or devices.
A systematic process for planning, analyzing, designing, developing, implementing, operating, and maintaining a computer-based application system. The scope of activities associated with a system, encompassing the system’s initiation, development and acquisition, implementation, operation and maintenance, and ultimately its disposal that instigates another system initiation.
Methodologies developed through software engineering to manage the complexity of system development. Development methodologies include software engineering aids and high-level design analysis tools.
The highest security level supported by a system at a particular time or in a particular environment (e.g., military/weapon systems, aircraft systems, and nuclear systems).
(1) Quality of a system or product reflecting the logical correctness and reliability of the operating system; verification that the original contents of information have not been altered or corrupted. (2) The quality that a system has when it performs its intended function in an unimpaired manner, free from unauthorized manipulation of the system, whether intentional or accidental.
A condition that exists when there is a potential of one or more programs that can bypass the installation’s control and (a) circumvent or disable store or fetch protection, (b) access a protected resource, and (c) obtain control in authorized (supervisor) state. This condition can lead to compromise of systems protection mechanisms and data integrity.
Organizations require a system inventory in place. All systems in the inventory should be categorized as a first step in support of the security planning activity and eventually in the assessment of the security controls implemented on the system.
A projection of the time period that begins with the installation of a system resource (e.g., software or hardware) and ends when the organization’s need for that resource has terminated.
The lowest security level supported by a computer system at a particular time or in a particular environment.
The IT manager who is responsible for the operation of a computer system.
A factor or property whose value determines a characteristic or behavior of the system.
The terms system reliability and system availability are closely related and often used (although incorrectly) synonymously. For example, a system that fails frequently but is restarted quickly has high availability even though its reliability is low. To distinguish between the two, reliability can be thought of as the quality of service and availability as the quantity of service. System reliability is measured in terms of downtime hours in a given period of time.