computer security object (C.F.D.) |
A resource, tool, or mechanism used to maintain a condition of security in a computerized environment. These objects are defined in terms of attributes they possess, operations they perform or are performed on them, and their relationship with other objects. |
computer security objects register (C.F.D.) |
A collection of computer security object (CSO) names and definitions kept by a registration authority. |
computer security subsystem (C.F.D.) |
Hardware/software designed to provide computer security features in a larger system environment. |
computerized telephone system (CTS) |
A generic term used to describe any telephone system that uses centralized stored program computer technology to provide switched telephone networking features and services. CTSs are referred to commercially, by such terms, as: computerized private branch exchange (CPBX); private branch exchange (PBX); private automatic branch exchange (PABX); electronic private automatic branch exchange (EABX); computerized branch exchange (CBX); computerized key telephone systems (CKTS); hybrid key systems; business communications systems; and office communications systems. |
computing environment |
Workstation or server (host) and its operating system, peripherals, and applications. |
COMSEC account |
An administrative entity identified by an account number, used to maintain accountability, custody and control of COMSEC material. |
COMSEC account audit |
Inventory and reconciliation of the holdings, records, and procedures of a COMSEC account ensuring all accountable COMSEC material is properly handled and safeguarded. |
COMSEC account manager |
An individual designated by proper authority to be responsible for the receipt, transfer, accountability, safeguarding, and destruction of COMSEC material assigned to a COMSEC account. This applies to both primary accounts and subaccounts. The equivalent key management infrastructure (KMI) position is the KMI operating account (KOA) manager. |
COMSEC aids |
All COMSEC material other than equipment or devices, which assist in securing telecommunications and is required in the production, operation, and maintenance of COMSEC systems and their components. Some examples are: COMSEC keying material, and supporting documentation, such as operating and maintenance manuals. |