anti-signal spoof |
Result of measures used to resist attempts to achieve imitative or manipulative communications deception based on signal parameters. |
anti-spoof |
Countermeasures taken to prevent the unauthorized use of legitimate identification & authentication (I&A) data, however it was obtained, to mimic a subject different from the attacker. |
anti-tamper (AT) |
Systems engineering activities intended to deter and/or delay exploitation of critical technologies in a U.S. defense system in order to impede countermeasure development, unintended technology transfer, or alteration of a system. |
application |
A software program hosted by an information system. |
application-specific integrated circuits (ASICs) |
Custom-designed and/or custom-manufactured integrated circuits. |
approval to operate (ATO) (C.F.D.) |
The official management decision issued by a designated accrediting authority (DAA) or principal accrediting authority (PAA) to authorize operation of an information system and to explicitly accept the residual risk to agency operations (including mission, functions, image, or reputation), agency assets, or individuals. See authorization to operate (ATO). |
assembly |
An item forming a portion of an equipment, that can be provisioned and replaced as an entity and which normally incorporates replaceable parts and groups of parts. |
assessment |
See security control assessment or risk assessment. |
assessment approach |
The approach used to assess risk and its contributing risk factors, including quantitatively, qualitatively, or semi-quantitatively. |
assessment findings |
Assessment results produced by the application of an assessment procedure to a security control or control enhancement to achieve an assessment objective; the execution of a determination statement within an assessment procedure by an assessor that results in either a satisfied or other than satisfied condition. |