Skip to Main Content
Idaho State University home

Glossary

Filter:
# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
C
C*
C1
C2
C3
C3I
C4
CA
Can
Cat
CBA
CBC
CCB
CCI
CCO
CDR
CDS
CF
CFD
CFE
CI
CIA
CIK
CIP
CK
CKG
CKL
CM
CMP
CMS
CN
CNK
COR
CPC
Cpi
CPS
CPU
CRB
CRC
CRO
CRP
CSA
CSC
CSE
CSM
CSO
CSS
CTY
CUP
CVA
CWC
Closed Security Environment
  • An environment that includes those systems in which both the following conditions hold true. a) Application developers (including maintainers) have sufficient clearances and authorizations to provide an acceptable presumption that they have not introduced malicious logic. Sufficient clearance is defined as follows: where the maximum classification of data to be processed is Confidential or below, developers are cleared and authorized to the same level as the most sensitive data; where the maximum classification of data to be processed is Secret or above, developers have at least a Secret clearance. b) Configuration control provides sufficient assurance that applications are protected against the introduction of malicious logic prior to and during operation of system applications. (CSC-STD-003-85;; CSC-STD-004-85;)
  • An environment in which both of the following conditions hold true. a) Application developers (including maintainers) have sufficient clearances and authorizations to provide acceptable presumption that they have not introduced malicious logic. b) Configuration control provides sufficient assurance that applications and the equipment are protected against the introduction of malicious logic prior to and during the operation of system applications. (NCSC-WA-001-85;)