Terms
Alphabetical index of published term entries with tag filters and quick sort.
- TERMAcceptable RiskUpdated Jan 06, 2026
Level of residual risk to the organization’s operations, assets, or individuals that falls within the defined risk appetite and risk tolerance by the organization.
- TERMAccess ControlUpdated Jan 06, 2026
Access control is the set of mechanisms and policies used to restrict access to resources and enforce authorization decisions.
- Updated Jan 06, 2026
A mechanism that implements access control for a system resource by enumerating the identities of the system entities that are permitted to access the resources.
- Updated Jan 06, 2026
A table in which each row represents a subject, each column represents an object, and each entry is the set of access rights for that subject to that object.
- Updated Jan 06, 2026
Implementations of formal AC policy such as AC model. Access control mechanisms can be designed to adhere to the properties of the model by machine implementation using protocols, architecture, or formal languages such as program code.
- Updated Jan 05, 2026
Formal presentations of the security policies enforced by AC systems, and are useful for proving theoretical limitations of systems. AC models bridge the gap in abstraction between policy and mechanism.
- Updated Jan 05, 2026
an access control paradigm whereby access rights are granted to users through the use of policies which combine attributes together. The policies can use any type of attributes (user attributes, resource attributes, environment attribute etc.
- Updated Jan 05, 2026
A set of procedures and/or processes, normally automated, which allows access to a controlled area or to information to be controlled, in accordance with pre established policies and rules.
- Updated Jan 05, 2026
Access Management is the set of practices that enables only those permitted the ability to perform an action on a particular resource. The three most common Access Management services you encounter every day perhaps without realizing it are: Policy Administration, Authentication, and Authorization.
- TERMaccountabilityUpdated Jan 06, 2026
The principle that an individual is entrusted to safeguard and control equipment, keying material, and information and is answerable to proper authority for the loss or misuse of that equipment or information.
- Updated Jan 06, 2026
A numeric code used to indicate the minimum accounting controls required for items of accountable COMSEC material within the COMSEC material control system (CMCS).
- TERMaccreditationUpdated Jan 06, 2026
The official management decision given by a senior agency official to authorize operation of an information system and to explicitly accept the risk to agency operations (including mission, functions, image, or reputation), agency assets, or individuals, based on the implementation of an agreed upon set of security controls.
- Updated Jan 05, 2026
A senior (federal) official or executive with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation.
- Updated Jan 05, 2026
The risk remaining after management has taken action to alter its severity.
- TERMactuatorUpdated Jan 05, 2026
A device for moving or controlling a mechanism or system. It is operated by a source of energy, typically electric current, hydraulic fluid pressure, or pneumatic pressure, and converts that energy into motion. An actuator is the mechanism by which a control system acts upon an environment. The control system can be simple (a fixed mechanical or electronic system), software based (e.g., a printer driver, robot control system), or a human or other agent.
- Updated Jan 06, 2026
Security commensurate with the risk and the magnitude of harm resulting from the loss, misuse, or unauthorized access to or modification of information.
- TERMadj-RIB-OutUpdated Jan 05, 2026
Routes that the BGP router will advertise, based on its local policy, to its peers.