JavaScriptMessages

APECAsia Pacific Economic Cooperation

.English.Español.tiếng Việt.По-русски.한국어.日本語.简体中文版HomeNewsRss FeedsSiteMap
  • Academics
    • Tools
      • Tool Downloads (Pg. 1)
      • Tool Downloads (Pg. 2)
      • Tool Downloads (Pg. 3)
      • Tool Downloads (Pg. 4)
  • Curriculum
    • CNSS Standards
    • Ethics and Law
    • K-12 Material
    • NSA Centers of Excellence
    • Teaching Materials
      • 4012 Presentation
      • Course Modules
        • Module 1
          • 01. (I) Corporate Resource
          • 02. (II) Basic Problems
          • 03. (III) Ethical Issues
          • 04. (IV) Studies
          • Teaching Considerations
        • Module 2
          • 01. (I) Ethics
          • 02. (II) Environment
          • 03. (III) Physical
          • 04. (IV) Data
          • 05. (V) Security Training
          • Teaching Considerations
        • Module 3
          • 01. (I) Planning
          • 02. (II) Organizational Policies & Procedures
          • 03. (III) Ethics and Professionalism
          • 04. (IV) Personnel Security
          • 05. (V) Physical Security
          • 06. (VI) System Security
          • 07. (VII) Threats & Vulnerabilities
          • 08. (VIII) Data Security & Recovery
          • 09. (IX) Control and Audit
          • 10. (X) Costs and Benefits
          • Teaching Considerations
        • Module 4
          • 01. (I) Underlying Problem
          • 02. (II) Laws as Tools for Information Security
          • 03. (III) Laws and Legislation as Legal Options to
          • Teaching Considerations
        • Module 5
          • 01. (I) Overview
          • 02. (II) System Sensitivity
          • 03. (III) Security Requirements
          • 04. (IV) Levels of Security
          • 05. (V) Data Life Cycles
          • 06. (VI) Sample Protection Plan
          • Teaching Considerations
        • Module 6
          • 01. (I) Overview
          • 02. (II) Threats
          • 03. (III) Countermeasures
          • 04. (IV) Tradeoffs-Costs & Benefits
          • 05. (V) Network Design
          • Teaching Considerations
        • Module 7
          • 01. (I) Overview
          • 02. (II) Development of Security Program
          • 03. (III) Risk Analysis
          • 04. (IV) Contingency Planning
          • 05. (V) Legal Issues for Managers
          • 06. (VI) System Validation & Verification (Accredi
          • 07. (VII) Information Systems Audit
          • 08. (VIII) Computer Security Check List
          • Teaching Considerations
        • Module 8
      • Course Modules Website
      • Course Videos
      • IA Videos
        • Videos (Pg. 1)
        • Videos (Pg. 2)
        • Videos (Pg. 3)
        • Videos (Pg. 4)
        • Videos (Pg. 5)
        • Videos (Pg. 6)
        • Videos (Pg. 7)
  • External Links
    • Academic Sites
    • Government Sites
    • Independent Organizations
    • Industry Sites
  • General Interest
    • Common Criteria
    • IA Activities
    • Professional Certification
    • Seminal Works
      • Seminal Papers
  • Glossary
  • Publications
    • Government Documents
      • Gov Docs (Pg. 1)
      • Gov Docs (Pg. 2)
      • Gov Docs (Pg. 3)
      • Gov Docs (Pg. 4)
      • Gov Docs (Pg. 5)
      • Gov Docs (Pg. 6)
    • IA Posters
      • IA Posters (Pg. 1)
      • IA Posters (Pg. 2)
      • IA Posters (Pg. 3)
      • IA Posters (Pg. 4)
      • IA Posters (Pg. 5)
      • IA Posters (Pg. 6)
    • Industry Documents
    • NIATEC Publications
    • Older Papers
    • Publisher Databases
Login

Glossary

Filter:
# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Return to List
G
G
Gabriel
Gag
GAO
Garbage Collect
Garble
Gas
Gaseous
Gate
Gateway
Gating
Gauss
Gawble
GC
GCOS
GECOS
Gedanken
Geef
Geek Code
Geek Out
Gen
Gender Mender
General Public Virus
GET
G-File
GLBA (Gramm-Leach-Bliley Act)
GNU
GNU Style'*
GPL
GPO
GPS
GPV
Gramm-Leach-Bliley Act (GLBA)
Granularity of access
Great Renaming
Great Runes
Great Worm, The
Great-Wall
Green Book
Green Bytes
Green Card
Green Lightning
Green Machine
Green's Theorem
Grep
Grey hat hackers
Grilf
Grind
Grind Crank
Gripenet
Gritch
Grok
Gronk
Gronk Out
Gronked
Grounding
Group ID (GID)
Group Identification
Group policy object (GPO)
Group Userid
Grovel
Grunge
GSA
GTS
Guard
Gubbish
Guest
Guidance For Applying The DoD TCSEC In Specific Environments
Guidance For Conducting Matching Programs
Guide To Writing The Security Features Users Guide For Trusted Systems
Guidelines
Guidelines For Formal Verification Systems
Guidelines For Trusted Facility Management
Guidelines For Writing Trusted Facility Manuals
Guiltware
Gumby
Gun
Gunch
Gurfle
Guru
Guru Meditation
Gweep
GWEN
Gypsy
Gypsy Verification Environment
Group Userid
  • A USERID snared by numerous authorized users. Also implies sharing of the associated Top Secret password. (JCS PUB 6-03. 7)

IRI, Pocatello, Idaho | NIATEC | Version: 2.2.1.4 | | 6 Mar 2019