Glossary

Filter:
# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
C
C*
C1
C2
C3
C3I
C4
CA
Can
Cat
CBA
CBC
CCB
CCI
CCO
CDR
CDS
CF
CFD
CFE
CI
CIA
CIK
CIP
CK
CKG
CKL
CM
CMP
CMS
CN
CNK
COR
CPC
Cpi
CPS
CPU
CRB
CRC
CRO
CRP
CSA
CSC
CSE
CSM
CSO
CSS
CTY
CUP
CVA
CWC
Certification
  • A statement that specifies the extent to which the security measures meet specifications. Certification is based on the results of the risk analysis performed. It does not necessarily imply a guarantee that the described system is impenetrable. It is an input to the security approval process. (AFR 205-16;)
  • External evaluation of an employee’s expertise.
  • A statement based on detailed technical analysis that specifies the extent to which the security measures in the system or facility meet the security requirements. Certification is based on the results of the risk analysis performed. It does not necessarily imply a guarantee that the described system is impenetrable. It is an input to the security accreditation process. (AFR 700-10;)
  • The technical evaluation of a system's security features, made as part of and in support of the approval/accreditation process, that establishes the extent to which a particular computer system's design and implementation meet a set of specified security requirements. (CSC-STD-001-83;)
  • The technical evaluation of an AIS's security features and other safeguards, made as part of and in support of the accreditation process, that establishes the extent to which a particular AIS design and implementation meet a set of specified security requirements. (DODD 5200. 28;)
  • An individual's formal written assurance that, based on evaluation of security tests, the classified ADP system and its environment meet the approved security specifications outlined by the ADP Security Plan (DOE 5636. 2A;)
  • The technical evaluation, made as part of and in support of the accreditation process, that establishes the extent to which the design and implementation of a computer system or network meet prespecified security requirements. (FIPS PUB 39;; AR 380-380;) 7. The resulting decision attesting to the system's ability to meet the specified security requirements. This decision is in support of the accreditation process and is based on the finding of a technical evaluation. (NCSC-WA-001-85;) 8. The technical process evaluation, made as part of and in support of the accreditation process, whereby a procedure, program, system, component, or system is shown to be secure; i. e. , that the security design specifications are correct and have been properly implemented. Certification is performed by independent technical personnel according to an acceptable standard of proof such that the level of security protection is identified with regard to a procedure, program, system component, or system. (OPNAVINST 5239. 1A;) 9. A reasonable assurance (based on a technical evaluation of a system test) and written acknowledgment made by a CPPM, or an individual designated by the CPPM, that a proposed unclassified computer application processing sensitive information meets all applicable federal and departmental policies, regulations, and procedures, and that results of a systems test demonstrate installed security safeguards are adequate and functioning properly. (DOE 1360. 2A) 10) The comprehensive evaluation of the technical and nontechnical security features of an AIS and other safeguards, made in support of the accreditation process, that establishes the extent to which a particular design and implementation meet a specified set of security requirements. (NCSC-TG-004-88)