(Created page with ''''Access level''' is the "[h]ierarchical portion of the security level used to identify the sensitivity of IS data and the clearance or authorization of users. Access le…') |
mNo edit summary Tag: sourceedit |
||
(7 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
+ | == Definition == |
||
⚫ | |||
+ | '''Access level''' is |
||
− | == Source == |
||
+ | {{Quote|[a] category within a given [[security classification]] limiting entry or [[system]] [[connectivity]] to only [[authorized]] persons.<ref>[[CNSSI 4009]], at 1.</ref>}} |
||
− | National Information Systems Security (INFOSEC) Glossary (NSTISSI No. 4009 Sept. 2000). |
||
+ | |||
+ | {{Quote|[a] measure of the rights that a [[user]] has to view or [[edit]] an item. Access levels are calculated separately for every [[user]] and every item.<ref>"IBM Terminology" ([http://www-01.ibm.com/software/globalization/terminology/a.html full-text]).</ref>}} |
||
+ | |||
⚫ | {{Quote|[t]he hierarchical portion of the [[security level]] used to identify the [[sensitivity]] of [[data]] and the clearance or [[authorization]] of [[user]]s. Note: The access level, in conjunction with the nonhierarchical categories, forms the [[sensitivity label]] of an object.<ref>[[Department of Defense]], [[National Computer Security Center]], Glossary of Computer Security Terms (NCSC-TG-004, Ver. 1) (Oct. 21, 1988).</ref>}} |
||
+ | |||
+ | == References == |
||
+ | <references /> |
||
[[Category:Security]] |
[[Category:Security]] |
||
+ | [[Category:Definition]] |
Latest revision as of 21:04, 17 July 2015
Definition[]
Access level is
“ | [a] category within a given security classification limiting entry or system connectivity to only authorized persons.[1] | ” |
“ | [a] measure of the rights that a user has to view or edit an item. Access levels are calculated separately for every user and every item.[2] | ” |
“ | [t]he hierarchical portion of the security level used to identify the sensitivity of data and the clearance or authorization of users. Note: The access level, in conjunction with the nonhierarchical categories, forms the sensitivity label of an object.[3] | ” |
References[]
- ↑ CNSSI 4009, at 1.
- ↑ "IBM Terminology" (full-text).
- ↑ Department of Defense, National Computer Security Center, Glossary of Computer Security Terms (NCSC-TG-004, Ver. 1) (Oct. 21, 1988).