Skip to Main Content
Idaho State University home

Glossary

Filter:
# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
T
T&E
TA
TAG
Tap
Tar
TCB
TCD
TCS
TCU
TD
TDM
TED
Tee
TEI
TEK
TEP
TFM
TFS
TLA
TLS
TMC
TNI
Toy
TPC
TPI
TRB
TRR
TSK
Tty
TV
TWX
System High Security Mode
  • A mode of operation where all personnel with access to the automated system have a security clearance but not a need-to-know for all material then contained in the system. A system operates in the system high security mode when the central computer facility and all of its connected peripheral devices and remote terminals are protected according to the requirement for the highest classifica- tion of material contained in the system. In this mode, the system design and operation must provide for some internal control of concurrently available classified material in the system on the basis of need-to-know. (AFR 205-16;; AFR 700-10;; OPNAVINST 5239. 1A;)
  • The mode of operation in which system hardware/software is only trusted to provide need-to-know protection between users. In this mode, the entire system, to include all components electrically and/or physically connected, must operate with security measures commensurate with the highest classification and sensitivity of the information being processed and/orstored. All system users in this environment must possess clearances and authorizations for all information contained in the system. All system output must be clearly marked with the highest classification and all system caveats, until the information has been reviewed manually by an authorized individual to ensure appropriate classifications and caveats have been affixed. (CSC-STD-003-85;)
  • A mode of operation wherein all users having access to the AIS possess a security clearance and formal access approval but not necessarily a need-to-know for all data handled by the AIS. (DODD 5200. 28;)
  • The mode of operation in which the computer system and all of its connected peripheral devices and remote terminals are protected in accordance with the requirements for the highest security level of material contained in the system at that time. All personnel having access to the Automated Information System have a security clearance but not a need-to-know for all material then contained in the system. (NCSC-WA-001-85;)