JavaScriptMessages
APEC
Asia Pacific Economic Cooperation
.English
.Español
.tiếng Việt
.По-русски
.한국어
.日本語
.简体中文版
Home
News
Rss Feeds
SiteMap
Academics
Tools
Tool Downloads (Pg. 1)
Tool Downloads (Pg. 2)
Tool Downloads (Pg. 3)
Tool Downloads (Pg. 4)
Curriculum
CNSS Standards
Ethics and Law
K-12 Material
NSA Centers of Excellence
Teaching Materials
4012 Presentation
Course Modules
Module 1
01. (I) Corporate Resource
02. (II) Basic Problems
03. (III) Ethical Issues
04. (IV) Studies
Teaching Considerations
Module 2
01. (I) Ethics
02. (II) Environment
03. (III) Physical
04. (IV) Data
05. (V) Security Training
Teaching Considerations
Module 3
01. (I) Planning
02. (II) Organizational Policies & Procedures
03. (III) Ethics and Professionalism
04. (IV) Personnel Security
05. (V) Physical Security
06. (VI) System Security
07. (VII) Threats & Vulnerabilities
08. (VIII) Data Security & Recovery
09. (IX) Control and Audit
10. (X) Costs and Benefits
Teaching Considerations
Module 4
01. (I) Underlying Problem
02. (II) Laws as Tools for Information Security
03. (III) Laws and Legislation as Legal Options to
Teaching Considerations
Module 5
01. (I) Overview
02. (II) System Sensitivity
03. (III) Security Requirements
04. (IV) Levels of Security
05. (V) Data Life Cycles
06. (VI) Sample Protection Plan
Teaching Considerations
Module 6
01. (I) Overview
02. (II) Threats
03. (III) Countermeasures
04. (IV) Tradeoffs-Costs & Benefits
05. (V) Network Design
Teaching Considerations
Module 7
01. (I) Overview
02. (II) Development of Security Program
03. (III) Risk Analysis
04. (IV) Contingency Planning
05. (V) Legal Issues for Managers
06. (VI) System Validation & Verification (Accredi
07. (VII) Information Systems Audit
08. (VIII) Computer Security Check List
Teaching Considerations
Module 8
Course Modules Website
Course Videos
IA Videos
Videos (Pg. 1)
Videos (Pg. 2)
Videos (Pg. 3)
Videos (Pg. 4)
Videos (Pg. 5)
Videos (Pg. 6)
Videos (Pg. 7)
External Links
Academic Sites
Government Sites
Independent Organizations
Industry Sites
General Interest
Common Criteria
IA Activities
Professional Certification
Seminal Works
Seminal Papers
Glossary
Publications
Government Documents
Gov Docs (Pg. 1)
Gov Docs (Pg. 2)
Gov Docs (Pg. 3)
Gov Docs (Pg. 4)
Gov Docs (Pg. 5)
Gov Docs (Pg. 6)
IA Posters
IA Posters (Pg. 1)
IA Posters (Pg. 2)
IA Posters (Pg. 3)
IA Posters (Pg. 4)
IA Posters (Pg. 5)
IA Posters (Pg. 6)
Industry Documents
NIATEC Publications
Older Papers
Publisher Databases
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
M
M
MAC
MAC (Media Access Control)
Macdink
Machinable
Machine Cryptosystem
Machine Instruction
Machine Language
Machine Learning
Machine Word
Machine-Oriented Language
Machine-Readable Medium
Machoflops
Macintoy
Macintrash
Macro
Macrology
Macros
Macrotape
Maggotbox
Magic
Magic Cookie
Magic Number
Magic Smoke
Magnetic Card
Magnetic Core Storage
Magnetic Disk
Magnetic Disk Unit
Magnetic Drum
Magnetic Drum Unit
Magnetic Field
Magnetic Field Intensity
Magnetic Flux
Magnetic Flux Density
Magnetic Media
Magnetic Oxide
Magnetic Remanence
Magnetic Saturation
Magnetic stripe card
Magnetic Tape
Magnetic Tapes
Mail host
Mail server
Mail server antivirus program
Mail Storm
Mailbomb
Mailbox
Mailing List
Main firewall
Main Loop
Mainframe
Maintainability
Maintenance
Maintenance Hook
Maintenance Key
Maintenance Of Configuration Documentation
Maintenance Procedures, Contract Employee
Maintenance Procedures, Local Employee
MAJCOM
MAJCOM C4 Systems Security Office
MAJCOM Computer System Security Manager
MAJCOM Computer System Security Manager (MCSSM)
Major incidents
Major Information System
Malicious Code
Malicious links
Malicious Logic
Malicious payload
Malicious software (Malware)
Malware (malicious software)
MAN
MAN (Metropolitan Area Network)
Managed security service provider (MSSP)
Management
Management Control Process
Management Information System
Management Of The Security Function
Manchester Encoding
Mandatory
Mandatory Access
Mandatory Access Control
Mandatory Access Control (MAC)
Mandatory Access Controls
Mandatory default algorithms
Mandatory Modification
Mandatory Protection
Mandatory vacations
Mandelbug
Manged
Mangle
Mangler
Mango
Man-in-the-middle attack
Manipulation Detection
Manipulative
Manipulative Communications Deception
Manual Cryptosystem
Manual Remote
Manual Remote Rekeying
Manularity
MAPLESS
Marbles
Marginal
Marginal Hacks
Marginally
Mark
Marketroid
Marking
Marking Of Media
Marking Of Sensitive Information
Marking Pulse
Marking Signal
Mars
Martian
M-Ary Code
MASINT
Mask
Masquerade
Masquerading
Massage
Master Crypto-Ignition Key
Master key
Master Station
Match index
Matching Programs
Material
Material Symbol
Math-Out
Matrix
MATSYM
Maximum Access Time
Maximum Maytag Mode
Mbogo, Dr. Fred
MBSA
MCCB
MCCR
MCSSM
MCTL
MD5
MD5 CHAP
MDC
Measure Of Effectiveness
Measurement And Signature Intelligence
Meatware
Media
Media Access Control (MAC)
Media Convergence
Mediation
Medium
Medium Access Control Sublayer
Meeces
MEECN
Meg
Mega
Megapenny
MEGO
Meltdown, Network
Member server
Meme
Meme Plague
Memetics
Memory
Memory (Non-Volatile)
Memory (Random)
Memory (Sequential)
Memory (Volatile)
Memory Address Translation Unit
Memory Bounds
Memory Bounds Checking
Memory Leak
Memory Mapping
Memory Page Cache
Memory Smash
Menu
Menuitis
MEP
MER
Message
Message Alignment Indicator
Message Authentication
Message Authentication Code
Message Authentication Codes
Message Broadcast
Message digest
Message Distribution Center
Message Externals
Message Format
Message Handling Systems
Message Indicator
Message integrity
Message Register Leads
Mess-Dos
Meta Bit
Metadata
Metal Particle Tape
Metamorphic viruses
Metasyntactic Variable
Method
Metric
Metrics
Metropolitan Area Network (MAN)
Metropolitan Area Network MAN
MFTL
Mgt
MHS
MHz
MI
MIB
Mickey
Mickey Mouse Program
Micro
Microcode
Microcomputer
Microengine
Microfloppies
Microfortnight
Microinstruction
MicroLenat
Microprocessor
Microprogram
MicroReid
Microsequencer
Microsoft Baseline Security Analyzer (MBSA)
Microsoft Challenge-Handshake Authentication Protocol (MS-CHAP)
Microsoft Management Console (MMC)
Microsoft Point-to-Point Encryption (MPPE)
Microtape
Microwave mw
Microwave/Wireless Communications Security
Middle-Endian
MIJI
Militarily Critical Technology
MilliLampson
MIL-STD
MIME filtering
Mimicking
Minicomputer
Minifloppies
Minimal Protection
Minimizing security burdens
Minor Change
Minor Change To A System Of Records
Minor incidents
MINTERM
MIPR
MIPS
Misbug
Misfeature
Missed'em-Five
Missile Address
Mission-Critical
Mission-Essential Unclassified Information
Miswart
MLS
MMC (Microsoft Management Console)
MOA
Mobile COMSEC Facility
Mobile content
Mobile Workstation Security
Moby
Mockingbird
Mod
Mode
Mode Bit
Mode Of Operation
Modem
Modes Of Operation
Modification
Modularity
Modulo
MOE
Molly-Guard
Mongolian Hordes Technique
Monitor
Monitor Signal
Monitoring
Monitoring (e. g. , Data, Line)
Monkey Up
Monkey, Scratch
Monochromatic
Monographic Processing
Monolithic TCB
Monstrosity
Monty
Moof
Moore's Law
Moose Cal
MOP
More fragments
Moria
MOU
Mouse
Mouse Ahead
Mouse Around
Mouse Belt
Mouse Droppings
Mouse Elbow
Mouso
MPPE (Microsoft Point-to-Point Encryption)
MRK
MRT
MS-DOS
MSE
MTBF
MTR
MTT
Mu
MUD
Muddie
Mudhead
Multichannel Information
Multician
Multics
Multilevel
Multi-Level
Multilevel Device
Multilevel Mode
Multilevel Mode Or Multilevel Security Mode
Multilevel Processing
Multilevel Secure
Multilevel Security
Multilevel Security Mode
Multilevel Systems
Multiple Access
Multiple Access Rights Terminal
Multiple Call
Multiplexing
Multiprocessing
Multiprocessor
Multiprogramming
Multi-pronged attacks
Multi-Satellite Link
Multitask
Multitasking
Multi-User Hosts
Multiuser Mode Of Operation
Multi-User Mode Of Operation
Multi-User Security Mode
Multi-User Security Mode Of Operation
Mumblage
Munch
Munching
Munching Squares
Munchkin
Mundane
Mung
Munge
Murphy's Law
Music
Mutter
Mutual Suspicion
Mutual Synchronization
Mutually Suspicious
Mutually Synchronized Network
MUX
Mw
Multilevel Security Mode
A mode of operation that provides a capability for various levels and categories or compartments of data to be concurrently stored and processed in an automated system and permits selective access to such material concurrently by users who have differing security clearances and need-to-know. Internal controls, as well as personnel, physical, and administrative controls, separate users and data on the basis of security clearance. The internal security controls must be thoroughly demonstrated to be effective in preventing unauthorized access to information. (AFR 205-16;)
A mode of operation in effect when at least some users with access to the system do not have a security clearance or need-to-know for all classified material in the information system. This mode provides the capability for the concurrent access to and use of the information system by uncleared users and users having different security clearances and need-to-know. The identification, segregation, and control of users and sensitive material on the basis of security clearance, and material classification category, and need-to-know must be essentially under automated control. Operation in this mode should be predicated on a comprehensive demonstration that the internal security controls can effectively prevent malicious attempts to bypass these controls. (AFR 700-10;)
The mode of operation which allows two or more classification levels of information to be processed simultaneously within the same system when some users are not cleared for all levels of information present. (CSC-STD-003-85;; NCSC-WA-001-85;)
A mode of operation wherein not all users have a clearance, formal access approval, and/or need-to-know for all data handled by the AIS. (DODD 5200. 28;)
A mode of operation under an operating system (supervisor or executive program) which provides a capability permitting various levels and categories or compartments of material to be concurrently stored and processed in an ADP system. In a remotely accessed resource-sharing system, the material can be selectively accessed and manipulated from variously controlled terminals by personnel having different security clearances and access approvals. This mode of operation can accommodate the concurrent processing and storage of: a) two or more levels of classified data, or b) one or more levels of classified data with unclassified data depending upon the constraints placed on the system by the Designated Approving Authority. (DODD 5200. 28M;)
An operation under an operating system (supervisor or executive program) which provides a capability permitting various categories and types of classified materials to be stored and processed concurrently in an ADP system and permitting selective access to such material concurrently by uncleared users having differing security clearances and need-to-know is accordingly accomplished by the operating system and associated system software. In a remotely accessed resource-sharing system, the material can be selectively accessed and manipulated from variously controlled terminals by personnel having different security clearances and need-to-know. This mode of operation can accommodate the concurrent processing and storage of: a) two or more levels of classified data, or b) one or more levels of classified data with unclassified data depending upon constraints placed on the system by the DAA (OPNAVINST 5239. 1A;)