Читаем CISSP Practice полностью

An error resulting from the expression of a command in a way that violates a program’s syntax rules. Syntax rules specify precisely how a command, statement, or instruction must be given to the computer so that it can recognize and process the instruction correctly.

Syslog

A protocol that specifies a general log entry format and a log entry transport mechanism. Log facility is the message type for a syslog message.

System

A discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. A generic term used for briefness to mean either a major/minor application (MA) or a general support system (GSS).

System administrator

A person who manages a multiuser computer system, including its operating system and applications, and whose responsibilities are similar to that of a network administrator. A system administrator would perform systems programmer activities with regard to the operating system and network control programs.

System availability

(1) A timely, reliable access to data, system, and information services for authorized users. (2) A measure of the amount of time that the system is actually capable of accepting and performing a user’s work. (3) The availability of communication ports and the amount or quantity of service received in a given period. (4) Can be viewed as a component of system reliability. The availability of a computer system can be expressed as a percentage in several ways, as follows:

Availability = (Uptime)/(Uptime + Downtime) × 100

Availability = (Available time/Scheduled time) × 100

Availability = [(MTTF)/(MTTF + MTTR)] × 100

Availability = (MTTF/MTBF) × 100

System confidentiality

Assurance that information is not disclosed to unauthorized individuals, processes, or devices.

System development life cycle (SDLC)

A systematic process for planning, analyzing, designing, developing, implementing, operating, and maintaining a computer-based application system. The scope of activities associated with a system, encompassing the system’s initiation, development and acquisition, implementation, operation and maintenance, and ultimately its disposal that instigates another system initiation.

System development methodologies

Methodologies developed through software engineering to manage the complexity of system development. Development methodologies include software engineering aids and high-level design analysis tools.

System high

The highest security level supported by a system at a particular time or in a particular environment (e.g., military/weapon systems, aircraft systems, and nuclear systems).

System integrity

(1) Quality of a system or product reflecting the logical correctness and reliability of the operating system; verification that the original contents of information have not been altered or corrupted. (2) The quality that a system has when it performs its intended function in an unimpaired manner, free from unauthorized manipulation of the system, whether intentional or accidental.

System integrity exposure

A condition that exists when there is a potential of one or more programs that can bypass the installation’s control and (a) circumvent or disable store or fetch protection, (b) access a protected resource, and (c) obtain control in authorized (supervisor) state. This condition can lead to compromise of systems protection mechanisms and data integrity.

System inventory

Organizations require a system inventory in place. All systems in the inventory should be categorized as a first step in support of the security planning activity and eventually in the assessment of the security controls implemented on the system.

System life

A projection of the time period that begins with the installation of a system resource (e.g., software or hardware) and ends when the organization’s need for that resource has terminated.

System low

The lowest security level supported by a computer system at a particular time or in a particular environment.

System manager

The IT manager who is responsible for the operation of a computer system.

System parameter

A factor or property whose value determines a characteristic or behavior of the system.

System reliability

The terms system reliability and system availability are closely related and often used (although incorrectly) synonymously. For example, a system that fails frequently but is restarted quickly has high availability even though its reliability is low. To distinguish between the two, reliability can be thought of as the quality of service and availability as the quantity of service. System reliability is measured in terms of downtime hours in a given period of time.

System resilience

Перейти на страницу:

Похожие книги

Масштаб. Универсальные законы роста, инноваций, устойчивости и темпов жизни организмов, городов, экономических систем и компаний
Масштаб. Универсальные законы роста, инноваций, устойчивости и темпов жизни организмов, городов, экономических систем и компаний

Жизненными циклами всего на свете – от растений и животных до городов, в которых мы живем, – управляют универсальные скрытые законы. Об этих законах – законах масштабирования – рассказывает один из самых авторитетных ученых нашего времени, чьи исследования совершили переворот в науке. «Эта книга – об объединенной и объединяющей системе концепций, которая позволила бы подступиться к некоторым из крупнейших задач и вопросов, над которыми мы бьемся сегодня, от стремительной урбанизации, роста населения и глобальной устойчивости до понимания природы рака, обмена веществ и причин старения и смерти. О замечательном сходстве между принципами действия городов, компаний и наших собственных тел и о том, почему все они представляют собой вариации одной общей темы, а их организация, структура и динамика с поразительной систематичностью проявляют сходные черты. Общим для всех них является то, что все они, будь то молекулы, клетки или люди, – чрезвычайно сложные системы, состоящие из огромного числа индивидуальных компонентов, взаимосвязанных, взаимодействующих и развивающихся с использованием сетевых структур, существующих на нескольких разных пространственных и временных масштабах…» Джеффри Уэст

Джеффри Уэст

Деловая литература / Зарубежная образовательная литература, зарубежная прикладная, научно-популярная литература / Финансы и бизнес