Glossary

Filter:
# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
M
M
MAC
MAN
MD5
MDC
Meg
MEP
MER
Mgt
MHS
MHz
MI
MIB
MLS
MOA
Mod
MOE
MOP
MOU
MRK
MRT
MSE
MTR
MTT
Mu
MUD
MUX
Mw
Modes Of Operation
  • The security environment and method of operating an ADP system or network. (OPNAVINST 5239. lA)
  • The definition of the security environment and approved methods of operating a system. (NCSC-TG-004-88)
  • A description of the conditions under which an AIS functions, based on the sensitivity of data processed and the clearance levels and authorizations of the users. Four modes of operation are authorized: Dedicated Mode - An AIS is operating in the dedicated mode when each user with direct or indirect individual access to the AIS, its peripherals, remote terminals, or remote hosts, has all of the following: a. A valid personnel clearance for all information on the system. b. Formal access approval for, and has signed nondisclosure agreements for all the information stored and/or processed (including all compartments, subcompartments and/or special access programs). c. A valid need-to-know for all information contained within the system.
  • System-High Mode An AIS is operating in the system-high mode when each user with direct or indirect access to the AIS, its peripherals, remote terminals, or remote hosts has all of the following: a. A valid personnel clearance for all information on the AIS. b. Formal access approval for, and has signed nondisclosure agreements for all the information stored and/or processed (including all compartments, subcompartments, and/or special access programs). c. A valid need-to-know for some of the information contained within the AIS.
  • Compartmented Mode An AIS is operating in the compartmented mode when each user with direct or indirect access to the AIS, its peripherals, remote terminals, or remote hosts, has all of the following: a. A valid personnel clearance for the most restricted information processed in the AIS. b. Formal access approval for, and has signed nondisclosure agreements for that information to which he/she is to have access. c. A valid need-to-know for that information to which he/she is to have access.
  • Multilevel Mode An AIS is operating in the multilevel mode when all the following statements are satisfied concerning the users with direct or indirect access to the AIS, its peripherals, remote terminals, or remote hosts: a. Some do not have a valid personnel clearance for all the information processed in the AIS. b. All have the proper clearance and have the appropriate formal access approval for that information to which he/she is to have access. c. All have a valid need-to-know for that information to which they are to have access. 7. The definition of the security environment and approved methods of operating an Automated Information System. (NCSC-WA-001-85;; OPNAVINST 5239. 1A;)