Previous

NEXT

automated security monitoring

Use of automated procedures to ensure security controls are not circumvented or the use of these tools to track actions taken by subjects suspected of misusing the information system.
See information security continuous monitoring.

automatic remote rekeying

Procedure to rekey distant cryptographic equipment electronically without specific actions by the receiving terminal operator. See manual remote rekeying.

availability

1. Ensuring timely and reliable access to and use of information.
Source: 44 U.S.C. Sec 3542
2. Timely, reliable access to data and information services for authorized users.
Source: NSA/CSS Manual Number 3-16 (COMSEC)