automated security monitoring |
Use of automated procedures to ensure security controls are not circumvented or the use of these tools to track actions taken by subjects suspected of misusing the information system. |
automatic remote rekeying |
Procedure to rekey distant cryptographic equipment electronically without specific actions by the receiving terminal operator. See manual remote rekeying. |
availability |
1. Ensuring timely and reliable access to and use of information. |