upload
Alliance for Telecommunications Industry Solutions
Industry: Telecommunications
Number of terms: 29235
Number of blossaries: 0
Company Profile:
ATIS is the leading technical planning and standards development organization committed to the rapid development of global, market-driven standards for the information, entertainment and communications industry.
1. The ability to ensure recovery without compromise after a system failure. 2. The property of a system which ensures that it can be returned to a secure operating state following a system failure, in accordance with the Security Policy.
Industry:Telecommunications
1. The ability of systems, units or forces to provide services to and accept services from other systems, units, or forces and to use the services so exchanged to enable them to operate effectively together. 2. The condition achieved among communications-electronics systems or items of communications-electronics equipment when information or services can be exchanged directly and satisfactorily between them and/or their users. The degree of interoperability should be defined when referring to specific cases. 3. Allows applications executing on separate hardware platforms, or in multi-processing environments on the same platform, to share data and cooperate in processing it through communications mechanisms such as remote procedure calls, transparent file access, etc. 4. The ability of a set of modeling and simulation to provide services to and accept services from other modeling and simulation, and to use the services for exchange enabling them to operate effectively together. 5. The capability to provide useful and cost-effective interchange of electronic data among, e.g., different signal formats, transmission media, applications, industries, or performance levels. 6. The ability of two or more systems to exchange information and to mutually use the information that has been exchanged.
Industry:Telecommunications
1. The ability and means necessary to store data in, to retrieve data from, to communicate with, or to make use of any resource of a system. 2. To obtain the use of a resource. 3. (COMSEC) The capability and opportunity to gain detailed knowledge of or to alter information or material. 4. (AIS) The ability and means to communicate with (i.e., input to or receive output from,) or otherwise make use of any information, resource, or component in an AIS. Note : An individual does not have "access" if the proper authority or a physical, technical, or procedural measure prevents him/her from obtaining knowledge or having an opportunity to alter information, material, resources, or components. 5. An assigned portion of system resources for one data stream of user communications or signaling. 6. An opportunity to make use of an information-system (IS) resource. 7. Condition where the potential exists for information to flow between entities. 8. A specific type of interaction between a subject and an object that results in the flow of information from one to the other. 9 A specific type of interaction between a subject and an object that results in the flow of information from one to the other. Possible information flows include the transfer of attributes pertaining to that object, the transfer of data pertaining to that object, or the fact of existence of that object. 10. A specific type of interaction between a subject and an object that results in the flow of information from one to the other.
Industry:Telecommunications
1. Tests to determine whether an implemented system fulfills its requirements. 2. The checking of data for correctness or for compliance with applicable standards, rules, and conventions. 3. The process of applying specialized security test and evaluation procedures, tools, and equipment needed to establish acceptance for joint usage of an information system (IS) by one or more departments or agencies and their contractors. Note: This action will include, as necessary, final development, evaluation, and testing, preparatory to acceptance by senior security test and evaluation staff specialists. 4. In universal personal telecommunications, the process of verifying that a user or terminal is authorized to access UPT services. 5. The checking of a representation of a system or part of a system for conformance with its requirements. 6. The process of evaluating a ported application, software, or system to ensure compliance with requirements.
Industry:Telecommunications
1. Telecommunication by modulation and radiation of electromagnetic waves. 2. A transmitter, receiver, or transceiver used for communication via electromagnetic waves. 3. A general term applied to the use of radio waves.
Industry:Telecommunications
1. System analysis and penetration technique in which the specification and documentation for an information system (IS) are analyzed to produce a list of hypothetical flaws. This list is prioritized on the basis of the estimated probability that a flaw exists, on the ease of exploiting it, and on the extent of control or compromise it would provide. The prioritized list is used to perform penetration testing of a system. 2. A system analysis and penetration technique where specifications and documentation for the system are analyzed and then flaws in the system are hypothesized. The list of hypothesized flaws is then prioritized on the basis of the estimated probability that a flaw actually exists and, assuming a flaw does exist, on the ease of exploiting it and on the extent of control or compromise it would provide. The prioritized list is used to direct the actual testing of the system.
Industry:Telecommunications
1. Synonym application. 2. Software that is specific to an application and is composed of programs, data and documentation.
Industry:Telecommunications
1. Synonym abbreviated dialing. 2. Dialing at a speed greater than the normal ten pulses per second.
Industry:Telecommunications
1. Supervision and control of the process whereby key is generated, stored, protected, transferred, loaded, used, and destroyed. 2. The generation, storage, distribution, deletion, archiving and application of keys in accordance with a security policy.
Industry:Telecommunications
1. Simulating a gray scale by using a group of pixels each capable of displaying only black and white. 2. A technique for varying raster color or intensity by illuminating and blanking pixels in patterns to produce a blurred transition from one color to another in a computer picture. Note: Dithering is used to create a wide variety of patterns for use as backgrounds, fills and shadings, as well as for creating halftones, and for correcting aliasing.
Industry:Telecommunications