The IT Law Wiki
(Created page with ''''Access level''' is the "[h]ierarchical portion of the security level used to identify the sensitivity of IS data and the clearance or authorization of users. Access le…')
 
m
Tag: sourceedit
 
(7 intermediate revisions by the same user not shown)
Line 1: Line 1:
  +
== Definition ==
'''Access level''' is the "[h]ierarchical portion of the [[security level]] used to identify the sensitivity of IS [[data]] and the clearance or authorization of users. Access level, in conjunction with the nonhierarchical categories, forms the [[sensitivity]] label of an object."
 
   
  +
'''Access level''' is
== Source ==
 
   
  +
{{Quote|[a] category within a given [[security classification]] limiting entry or [[system]] [[connectivity]] to only [[authorized]] persons.<ref>[[CNSSI 4009]], at 1.</ref>}}
National Information Systems Security (INFOSEC) Glossary (NSTISSI No. 4009 Sept. 2000).
 
  +
  +
{{Quote|[a] measure of the rights that a [[user]] has to view or [[edit]] an item. Access levels are calculated separately for every [[user]] and every item.<ref>"IBM Terminology" ([http://www-01.ibm.com/software/globalization/terminology/a.html full-text]).</ref>}}
  +
 
{{Quote|[t]he hierarchical portion of the [[security level]] used to identify the [[sensitivity]] of [[data]] and the clearance or [[authorization]] of [[user]]s. Note: The access level, in conjunction with the nonhierarchical categories, forms the [[sensitivity label]] of an object.<ref>[[Department of Defense]], [[National Computer Security Center]], Glossary of Computer Security Terms (NCSC-TG-004, Ver. 1) (Oct. 21, 1988).</ref>}}
  +
  +
== References ==
  +
<references />
 
[[Category:Security]]
 
[[Category:Security]]
  +
[[Category:Definition]]

Latest revision as of 21:04, 17 July 2015

Definition[]

Access level is

[a] category within a given security classification limiting entry or system connectivity to only authorized persons.[1]
[a] measure of the rights that a user has to view or edit an item. Access levels are calculated separately for every user and every item.[2]
[t]he hierarchical portion of the security level used to identify the sensitivity of data and the clearance or authorization of users. Note: The access level, in conjunction with the nonhierarchical categories, forms the sensitivity label of an object.[3]

References[]

  1. CNSSI 4009, at 1.
  2. "IBM Terminology" (full-text).
  3. Department of Defense, National Computer Security Center, Glossary of Computer Security Terms (NCSC-TG-004, Ver. 1) (Oct. 21, 1988).