Главная Случайная страница Контакты | Мы поможем в написании вашей работы! | ||
|
We have received numerous requests to provide a summary glossary for our publications and other relevant sources, and to make the glossary available to practitioners. As a result of these requests, this glossary of common security terms has been extracted from NIST Federal Information Processing Standards (FIPS), the Special Publication (SP) 800 series, NIST Interagency Reports (NISTIRs), and from the Committee for National Security Systems Instruction 4009 (CNSSI-4009). The glossary includes most of the terms in the NIST publications. It also contains nearly all of the terms and definitions from CNSSI-4009. The glossary provides a central resource of terms and definitions most commonly used in NIST information security publications and in CNSS information assurance publications. For a given term, we do not include all definitions in NIST documents – especially not from the older NIST publications. Since draft documents are not stable, we do not refer to terms/definitions in them.
It is our intention to keep the glossary current by providing updates online. New definitions will be added to the glossary as required, and updated versions will be posted on the Computer Security Resource Center (CSRC) Web site at http://csrc.nist.gov/.
Access – | Ability to make use of any information system (IS) resource. SOURCE: SP 800-32 Ability and means to communicate with or otherwise interact with a system, to use system resources to handle information, to gain knowledge of the information the system contains, or to control system components and functions. SOURCE: CNSSI-4009 |
Access Control – | The process of granting or denying specific requests to: 1) obtain and use information and related information processing services; and 2) enter specific physical facilities (e.g., federal buildings, military establishments, border crossing entrances). SOURCE: FIPS 201; CNSSI-4009 |
Active Attack – | An attack that alters a system or data. |
Active Security Testing – | Security testing that involves direct interaction with a target, such as sending packets to a target. |
Activities – | An assessment object that includes specific protection-related pursuits or actions supporting an information system that involve people (e.g., conducting system backup operations, monitoring network traffic). |
Advanced Encryption Standard – (AES) | The Advanced Encryption Standard specifies a U.S. government-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information. This standard specifies the Rijndael algorithm, a symmetric block cipher that can process data blocks of 128 bit A U.S. government-approved cryptographic algorithm that can be used to protect electronic data. The AES algorithm is a symmetric block cipher that can encrypt (encipher) and decrypt (decipher) information. |
Agent – | A program used in distributed denial of service (DDoS) attacks that send malicious traffic to hosts based on the instructions of a handler. Also known as a bot. SOURCE: SP 800-61 A program acting on behalf of a person or organization. SOURCE: SP 800-95 |
Alert – | Notification that a specific attack has been directed at an organization’s information systems. SOURCE: CNSSI-4009 |
Anomaly-Based Detection – | The process of comparing definitions of what activity is considered normal against observed events to identify significant deviations. SOURCE: SP 800-94 |
Anti-jam – | Countermeasures ensuring that transmitted information can be received despite deliberate jamming attempts. SOURCE: CNSSI-4009 |
Anti-spoof – | Countermeasures taken to prevent the unauthorized use of legitimate Identification & Authentication (I&A) data, however it was obtained, to mimic a subject different from the attacker. |
Application – | A software program hosted by an information system. |
Asset – | A major application, general support system, high impact program, physical plant, mission critical system, personnel, equipment, or a logically related group of systems. SOURCE: CNSSI-4009 |
Asymmetric Cryptography – | See Public Key Cryptography. SOURCE: CNSSI-4009 |
Asymmetric Keys – | Two related keys, a public key and a private key that are used to perform complementary operations, such as encryption and decryption or signature generation and signature verification. SOURCE: FIPS 201 |
Attack – | An attempt to gain unauthorized access to system services, resources, or information, or an attempt to compromise system integrity. Any kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself. |
Audit – | Independent review and examination of records and activities to assess the adequacy of system controls, to ensure compliance with established policies and operational procedures. |
Audit Data – | Chronological record of system activities to enable the reconstruction and examination of the sequence of events and changes in an event. |
Audit Log – | A chronological record of system activities. Includes records of system accesses and operations performed in a given period. |
Authenticate – | To confirm the identity of an entity when that identity is presented. To verify the identity of a user, user device, or other entity. |
Authentication – | Verifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in an information system. |
Authentication – | The process of establishing confidence of authenticity. SOURCE: FIPS 201 |
Authentication – | Encompasses identity verification, message origin authentication, and message content authentication. SOURCE: FIPS 190 |
Authentication – | A process that establishes the origin of information or determines an entity’s identity. SOURCE: SP 800-21 The process of verifying the identity or other attributes claimed by or assumed of an entity (user, process, or device), or to verify the source and integrity of data. |
Authority – | Person(s) or established bodies with rights and responsibilities to exert control in an administrative sphere. SOURCE: CNSSI-4009 |
Authorization – | Access privileges granted to a user, program, or process or the act of granting those privileges. |
Autonomous System (AS) – | One or more routers under a single administration operating the same routing policy. SOURCE: SP 800-54 |
Availability – | Ensuring timely and reliable access to and use of information. |
Back Door – | Typically unauthorized hidden software or hardware mechanism used to circumvent security controls. SOURCE: CNSSI-4009 |
Backdoor – | An undocumented way of gaining access to a computer system. |
Backup – | A copy of files and programs made to facilitate recovery, if necessary. |
Biometric – | A physical or behavioral characteristic of a human being. |
Biometric – | A measurable physical characteristic or personal behavioral trait used to recognize the identity, or verify the claimed identity, of an applicant. Facial images, fingerprints, and iris scan samples are all examples of biometrics. |
Block Cipher – | A symmetric key cryptographic algorithm that transforms a block of information at a time using a cryptographic key. For a block cipher algorithm, the length of the input block is the same as the length of the output block. |
Boundary – | Physical or logical perimeter of a system. |
Boundary Protection – | Monitoring and control of communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communication, through the use of boundary protection devices (e.g., proxies, gateways, routers, firewalls, guards, encrypted tunnels). |
Brute Force Password Attack – | A method of accessing an obstructed device through attempting multiple combinations of numeric and/or alphanumeric passwords. |
Certificate – | A digital representation of information which at least 1) identifies the certification authority issuing it, 2) names or identifies its subscriber, 3) contains the subscriber's public key, 4) identifies its operational period, and 5) is digitally signed by the certification authority issuing it. SOURCE: SP 800-32 |
Certificate Management – | Process whereby certificates (as defined above) are generated, stored, protected, transferred, loaded, used, and destroyed. |
Certificate Revocation List (CRL) – | A list of revoked public key certificates created and digitally signed by a Certification Authority. |
Certification Authority | A trusted entity that issues and revokes public key certificates. |
Cipher – | Series of transformations that converts plaintext to ciphertext using the Cipher Key. SOURCE: FIPS 197 Any cryptographic system in which arbitrary symbols or groups of symbols, represent units of plain text, or in which units of plain text are rearranged, or both. |
Cipher Suite – | Negotiated algorithm identifiers. Cipher suites are identified in human-readable form using a pneumonic code. |
Ciphertext – | Data output from the Cipher or input to the Inverse Cipher. SOURCE: FIPS 197 Data in its enciphered form. |
Clear Text – | Information that is not encrypted. |
Clearing – | Removal of data from an information system, its storage devices, and other peripheral devices with storage capacity, in such a way that the data may not be reconstructed using common system capabilities (i.e., through the keyboard); |
Cloud Computing – | A model for enabling on-demand network access to a shared pool of configurable IT capabilities/ resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. It allows users to access technology-based services from the network cloud without knowledge of, expertise with, or control over the technology infrastructure that supports them. This cloud model is composed of five essential characteristics (on-demand self-service, ubiquitous network access, location independent resource pooling, rapid elasticity, and measured service); three service delivery models (Cloud Software as a Service [SaaS], Cloud Platform as a Service [PaaS], and Cloud Infrastructure as a Service [IaaS]); and four models for enterprise access (Private cloud, Community cloud, Public cloud, and Hybrid cloud). |
Code – | System of communication in which arbitrary groups of letters, numbers, or symbols represent units of plain text of varying length. |
Compromise – | Disclosure of information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred. SOURCE: SP 800-32 |
Computer Security (COMPUSEC) – | Measures and controls that ensure confidentiality, integrity, and availability of information system assets including hardware, software, firmware, and information being processed, stored, and communicated. |
Confidentiality – | The property that sensitive information is not disclosed to unauthorized individuals, entities, or processes. SOURCE: FIPS 140-2 |
Countermeasures – | Actions, devices, procedures, techniques, or other measures that reduce the vulnerability of an information system. Synonymous with security controls and safeguards. |
Cryptography – | The discipline that embodies principles, means, and methods for providing information security, including confidentiality, data integrity, non-repudiation, and authenticity. Art or science concerning the principles, means, and methods for rendering plain information unintelligible and for restoring encrypted information to intelligible form. |
Cryptology – | The science that deals with hidden, disguised, or encrypted communications. It includes communications security and communications. The mathematical science that deals with cryptanalysis and cryptography. intelligence. SOURCE: SP 800-60 |
Data – | A subset of information in an electronic format that allows it to be retrieved or transmitted. |
Data Encryption Standard (DES) – | Cryptographic algorithm designed for the protection of unclassified data and published by the National Institute of Standards and Technology (NIST) in Federal Information Processing Standard (FIPS) Publication 46. (FIPS 46-3 withdrawn 19 May 2005) See Triple DES. |
Decode – | Convert encoded text to plain text by means of a code. |
Decryption – | The process of transforming ciphertext into plaintext. SOURCE: SP 800-67 |
Decryption – | The process of changing ciphertext into plaintext using a cryptographic algorithm and key. SOURCE: SP 800-21 |
Decryption – | Conversion of ciphertext to plaintext through the use of a cryptographic algorithm. |
Denial of Service (DoS) – | An attack that prevents or impairs the authorized use of networks, systems, or applications by exhausting resources. SOURCE: SP 800-61 The prevention of authorized access to resources or the delaying of time-critical operations. (Time-critical may be milliseconds or it may be hours, depending upon the service provided.) |
Digital Signature – | An asymmetric key operation where the private key is used to digitally sign an electronic document and the public key is used to verify the signature. Digital signatures provide authentication and integrity protection. SOURCE: SP 800-63 |
Digital Signature – | The result of a cryptographic transformation of data which, when properly implemented, provides the services of: 1. origin authentication, 2. data integrity, and 3. signer non-repudiation. SOURCE: FIPS 140-2 |
Disaster Recovery Plan (DRP) – | A written plan for recovering one or more information systems at an alternate facility in response to a major hardware or software failure or destruction of facilities. SOURCE: SP 800-34 Management policy and procedures used to guide an enterprise response to a major loss of enterprise capability or damage to its facilities. The DRP is the second plan needed by the enterprise risk managers and is used when the enterprise must recover (at its original facilities) from a loss of capability over a period of hours or days. |
Encryption – | Conversion of plaintext to ciphertext through the use of a cryptographic algorithm. SOURCE: FIPS 185 |
Entity – | Either a subject (an active element that operates on information or the system state) or an object (a passive element that contains or receives information). |
Entity – | An active element in an open system. SOURCE: FIPS 188 |
Event – | Any observable occurrence in a network or system. SOURCE: SP 800-61 Any observable occurrence in a system and/or network. Events sometimes provide indication that an incident is occurring. |
False Acceptance Rate (FAR) – | The probability that a biometric system will incorrectly identify an individual or will fail to reject an impostor. The rate given normally assumes passive impostor attempts. The measure of the likelihood that the biometric security system will incorrectly accept an access attempt by an unauthorized user. A system’s false acceptance rate typically is stated as the ratio of the number of false acceptances divided by the number of identification attempts. |
False Rejection Rate (FRR) – | The probability that a biometric system will fail to identify an applicant, or verify the legitimate claimed identity of an applicant. The measure of the likelihood that the biometric security system will incorrectly reject an access attempt by an authorized user. A system’s false rejection rate typically is stated as the ratio of the number of false rejections divided by the number of identification attempts. |
Firewall – | A hardware/software capability that limits access between networks and/or systems in accordance with a specific security policy. |
Flooding – | An attack that attempts to cause a failure in a system by providing more input than the system can process properly. |
Gateway – | Interface providing compatibility between networks by converting transmission speeds, protocols, codes, or security measures. |
Hardware – | The physical components of an information system. See software and firmware. |
Hash Function – | A function that maps a bit string of arbitrary length to a fixed length bit string. Approved hash functions satisfy the following properties: 1) One-Way. It is computationally infeasible to find any input that maps to any prespecified output. 2) Collision Resistant. It is computationally infeasible to find any two distinct inputs that map to the same output. |
Hashing – | The process of using a mathematical algorithm against data to produce a numeric value that is representative of that data. |
Identification – | The process of verifying the identity of a user, process, or device, usually as a prerequisite for granting access to resources in an IT system. SOURCE: SP 800-47 |
Identification – | The process of discovering the true identity (i.e., origin, initial history) of a person or item from the entire collection of similar persons or items. SOURCE: FIPS 201 |
Incident – | A violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices. SOURCE: SP 800-61 |
Information – | An instance of an information type. SOURCE: FIPS 200; FIPS 199; SP 800-60 Any communication or representation of knowledge such as facts, data, or opinions in any medium or form, including textual, numerical, graphic, cartographic, narrative, or audiovisual. SOURCE: CNSSI-4009 |
Information Security – | The protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability. |
Information Security – | Protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide— 1) integrity, which means guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity; 2) confidentiality, which means preserving authorized restrictions on access and disclosure, including means for protecting personal privacy and proprietary information; and 3) availability, which means ensuring timely and reliable access to and use of information. SOURCE: SP 800-66; 44 U.S.C., Sec 3541 |
Integrity – | Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. SOURCE: SP 800-53; SP 800-53A; SP 800-18; SP 800-27; SP 800-37; SP 800-60; FIPS 200; FIPS 199; 44 U.S.C., Sec. 3542 |
Integrity – | The property that sensitive data has not been modified or deleted in an unauthorized and undetected manner. SOURCE: FIPS 140-2 The property whereby an entity has not been modified in an unauthorized manner. SOURCE: CNSSI-4009 |
Intrusion – | Unauthorized act of bypassing the security mechanisms of a system. |
Intrusion Detection Systems (IDS) – | Hardware or software product that gathers and analyzes information from various areas within a computer or a network to identify possible security breaches, which include both intrusions (attacks from outside the organizations) and misuse (attacks from within the organizations.) SOURCE: CNSSI-4009 |
IP Security (IPsec) – | Suite of protocols for securing Internet Protocol (IP) communications at the network layer, layer 3 of the OSI model by authenticating and/or encrypting each IP packet in a data stream. IPsec also includes protocols for cryptographic key establishment. |
Key – | A value used to control cryptographic operations, such as decryption, encryption, signature generation, or signature verification. |
Key Management – | The activities involving the handling of cryptographic keys and other related security parameters (e.g., IVs and passwords) during the entire life cycle of the keys, including their generation, storage, establishment, entry and output, and zeroization. |
Malicious Code – | Software or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of an information system. A virus, worm, Trojan horse, or other code-based entity that infects a host. Spyware and some forms of adware are also examples of malicious code. SOURCE: SP 800-53; CNSSI-4009 A virus, worm, Trojan horse, or other code-based malicious entity that successfully infects a host. |
Network – | Information system(s) implemented with a collection of interconnected components. Such components may include routers, hubs, cabling, telecommunications controllers, key distribution centers, and technical control devices. |
Passive Attack – | An attack against an authentication protocol where the attacker intercepts data traveling along the network between the claimant and verifier, but does not alter the data (i.e., eavesdropping). SOURCE: SP 800-63 An attack that does not alter systems or data. |
Plaintext – | Data input to the Cipher |
Plaintext – | Intelligible data that has meaning and can be understood without the application of decryption. |
Private Key – | The secret part of an asymmetric key pair that is typically used to digitally sign or decrypt data. |
Protocol – | Set of rules and formats, semantic and syntactic, permitting information systems to exchange information. |
Proxy Server – | A server that services the requests of its clients by forwarding those requests to other servers. SOURCE: CNSSI-4009 |
Public Key – | The public part of an asymmetric key pair that is typically used to verify signatures or encrypt data. |
Risk – | The level of impact on organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals resulting from the operation of an information system given the potential impact of a threat and the likelihood of that threat occurring. SOURCE: FIPS 200 |
Risk Analysis – | The process of identifying the risks to system security and determining the likelihood of occurrence, the resulting impact, and the additional safeguards that mitigate this impact. Part of risk management and synonymous with risk assessment. SOURCE: SP 800-27 Examination of information to identify the risk to an information system. See risk assessment. SOURCE: CNSSI-4009 |
Risk Management – | The process of managing risks to organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals resulting from the operation of an information system, and includes: 1) the conduct of a risk assessment; 2) the implementation of a risk mitigation strategy; and 3) employment of techniques and procedures for the continuous monitoring of the security state of the information system. SOURCE: FIPS 200 |
Safeguards – | Protective measures prescribed to meet the security requirements (i.e., confidentiality, integrity, and availability) specified for an information system. Safeguards may include security features, management constraints, personnel security, and security of physical structures, areas, and devices. Synonymous with security controls and countermeasures. |
Scanning – | Sending packets or requests to another system to gain information to be used in a subsequent attack. |
Secret Key – | A cryptographic key that must be protected from unauthorized disclosure to protect data encrypted with the key. The use of the term “secret” in this context does not imply a classification level; rather, the term implies the need to protect the key from disclosure or substitution. SOURCE: FIPS 201 |
Secret Key – | A cryptographic key that is uniquely associated with one or more entities. The use of the term “secret” in this context does not imply a classification level, but rather implies the need to protect the key from disclosure or substitution. |
Security – | A condition that results from the establishment and maintenance of protective measures that enable an enterprise to perform its mission or critical functions despite risks posed by threats to its use of information systems. Protective measures may involve a combination of deterrence, avoidance, prevention, detection, recovery, and correction that should form part of the enterprise’s risk management approach. |
Software – | Computer programs and associated data that may be dynamically written or modified during execution. |
Symmetric Key – | A single cryptographic key that is used with a secret (symmetric) key algorithm. |
System Interconnection – | The direct connection of two or more IT systems for the purpose of sharing data and other information resources. |
Telecommunications – | Preparation, transmission, communication, or related processing of information (writing, images, sounds, or other data) by electrical, electromagnetic, electromechanical, electro-optical, or electronic means. SOURCE: CNSSI-4009 |
Threat – | Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. SOURCE: SP 800-53 The potential source of an adverse event. SOURCE: SP 800-61 |
Token – | Something that the claimant possesses and controls (typically a key or password) used to authenticate the claimant’s identity. SOURCE: SP 800-63 Something that the claimant possesses and controls (such as a key or password) that is used to authenticate a claim. See also cryptographic token. |
Trap Door – | 1. A means of reading cryptographically protected information by the use of private knowledge of weaknesses in the cryptographic algorithm used to protect the data. 2. In cryptography, one-to-one function that is easy to compute in one direction, yet believed to be difficult to invert without special information. |
Tunneling – | Technology enabling one network to send its data via another network’s connections. Tunneling works by encapsulating a network protocol within packets carried by the second network. |
Validation – | The process of demonstrating that the system under consideration meets in all respects the specification of that system. |
Verification – | Confirmation, through the provision of objective evidence, that specified requirements have been fulfilled (e.g., an entity’s requirements have been correctly defined, or an entity’s attributes have been correctly presented; or a procedure or function performs as intended and leads to the expected outcome). |
Victim – | A machine that is attacked. SOURCE: SP 800-61 |
Virtual Private Network (VPN) – | A virtual network, built on top of existing physical networks, that provides a secure communications tunnel for data and other information transmitted between networks. SOURCE: SP 800-46 Protected information system link utilizing tunneling, security controls (see Information Assurance), and endpoint address translation giving the impression of a dedicated line |
Virus – | A self-replicating program that runs and spreads by modifying other programs or files. SOURCE: SP 800-61 A computer program that can copy itself and infect a computer without permission or knowledge of the user. A virus might corrupt or delete data on a computer, use email programs to spread itself to other computers, or even erase everything on a hard disk. |
Vulnerability – | Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source. A weakness in a system, application, or network that is subject to exploitation or misuse. |
1. access доступ
2. accept[able] принять, [приемлемый]
3. advise уведомить, советовать
4. adverse неблагоприятный
5. arbitrary произвольный
6. assessment оценка
7. asset актив
8. assignment назначение
9. assigned назначенный
10. assurance гарантия
11. associating связыванный
12. attach приложить
13. authentication аутентификация, установление подлинности
14. balance уравновешивать
15. based основанный
16. bind связывать
17. broadcast широковещание
18. carry нести, проводить
19. carrier носитель,
20. checksum контрольная сумма
21. cipher шифр
22. claim утверждать, требование
23. choose выбирать
24. confirm подтвердить
25. compatibility переносимость, совместимость
26. compare сравнивать
27. confidence доверие, конфиденциальное сообщение
28. consecutive следующий друг за другом
29. convergence сближение
30. content содержание
31. contention утверждение
32. competition соревнование, конкурс
33. countermeasure контрмера, противодействие
34. defined определенный
35. determination определение
36. determined определяется
37. deny отрицать
38. denial отказ
39. derive происходить, выводить
40. describe описывать
41. distribute распределять
42. determine определять
43. denial of service отказ от обслуживания
44. disruption разрушение
45. duration продолжительность
46. entity субъект, сущность, юр. лицо
47. expands расширяется
48. evaluation оценка
49. facility средство
50. False Rejection Rate коэффициент ошибочного отказа в доступе
51. flaw недостаток, слабое место
52. employ нанять, нанимать
53. employers работодатели, предприниматели
54. employees сотрудники, служащие
55. enforce навязывать
56. enhancement улучшение
57. ensure обеспечивать, гарантировать
58. either любой
59. execution выполнение
60. audio frequencies звуковые частоты
61. gateway шлюз
62. granting предоставление
63. handle ручка, управлять
64. hardware аппаратные средства
65. half duplex полудуплексный
66. hostile враждебный
67. implementation реализация
68. investigative следственный
69. interconnected взаимосвязанные
70. infeasible неосуществимый
71. issued выпущенный
72. incorporation включение
73. intermediary посредник
74. interference вмешательство
75. involve вовлечь, включать
76. intent намереваться, намерение
77. labeling маркировка
78. maintenance of security обеспечение безопасности
79. mandatory принудительный, обязательный
80. malicious злонамеренный
81. measure мера, измерять
82. node узел, устройство, подключенное к сети
83. notification уведомление
84. obtain получать
85. occur происходить
86. reserved зарезервированный
87. permutation перестановка (бит, символов)
88. penetration проникновение
89. perceive воспринимать
90. packet switching коммутация пакетов
91. perform выполнять, исполнять
92. portions части
93. property свойство, собственность
94. public key открытый ключ
95. pursue преследовать
96. pursuant преследующий, в соответствии
97. predecessor предшественник
98. permit разрешать
99. purpose цель, намерение, намереваться
100. relate относиться
101. related относящийся, связанный с
102. require требуется
103. required требуемый
104. equests запросы
105. Represent представить
106. restrict аннулирование
107. revoke аннулировать
108. routing маршрутизация
109. sequence последовательность
110. safeguard гарантия
111. scope сфера
112. suspend приостановить
113. session layer сеансовый уровень
114. threat угроза безопасности
115. transmit передавать
116. trap door ловушка
117. rust доверять, доверие
118. survive выжить, выживать
119. survivability живучесть
120. varying изменение, различный
121. verification проверка
122. verify проверить
123. violation нарушение
124. vulnerability уязвимость
125. unauthorized несанкционированный
Контрольные вопросы часть 1
1. Понятие сигнала. Аналоговый и дискретный сигналы.
2. Информационный параметр звукового сигнала
3. Скорость распространения электрических сигналов
4. Понятие электросвязи
5. Коммутация каналов, сообщений, пакетов
6. Сеть связи.
7. Понятия первичной и вторичной сети
8. Требования к линиям связи
9. Классификация проводных систем связи по типу среды передачи
10. Витая пара, ее разновидности, UTP, STP.
11. Принцип распространения оптического излучения вдоль оптического волокна.
12. Виды оптоволоконных кабелей.
13. Строение атмосферы земли.
14. Вид, тип и диапазон радиоволн. Вид и диапазон частот. ОНЧ, НЧ, СЧ, ВЧ, ОВЧ, УВЧ, СВЧ, КВЧ, ГВЧ.
15. Диапазоны частот спутниковой связи.
16. Радиопередающие устройства. Состав.
17. Радиоприемные устройства. Состав.
18. Радиорелейные системы передач. Диапазоны частот.
19. Тропосферные радиорелейные системы передач.
20. Спутниковые системы связи. 3 разновидности ИСЗ.
21. Параметры геостационарной орбиты.
22. Низковысотная орбита. Параметры.
23. Особенности передачи сигналов для ССС.
24. Уровень передачи сигнала, дБм, дБн.
25. Понятие многоканальной системы связи.
26. Общий принцип модуляции. 3 вида модуляции.
27. Пример амплитудной модуляции аналогового сигнала.
28. Пример амплитудной модуляции битовой последовательности 1011100
29. Пример фазовой модуляции битовой последовательности 1011100.
30. Пример частотной модуляции битовой последовательности 1011100.
31. Виды модуляции BPSK, QPSK, 8-PSK, 16-QAM
32. Дискретизация аналогового сигнала
33. Квантование сигнала
34. Теорема Котельникова
35. Импульсно-кодовая модуляция, ИКМ-сигнал.
36. Двоичные коды, примеры.
37. Цифровая обработка аналоговых сигналов.
38. Параметрическое компандирование речевых сигналов. Вокодерные системы
39. Понятие мультиплексирования
40. FDM
41. TDM
42. WDM
43. Особенности построения цифровых систем передачи.
44. PDH. Скорость и коэффициент мультиплексирования для различных уровней иерархии европейской PDH.
45. SDH. STM-1, STM-4, STM-16, STM-64.
46. Функционирование системы передачи SDH.
47. Понятие виртуального контейнера SDH.
48. Преимущества SDH.
49. Перспективы SDH. Оптические транспортные сети OTN.
50. NGN SDH.
51. Понятие спектрального уплотнения в ВОСП.
52. WDM, CWDM, DWDM, HDVDM.
Контрольные вопросы часть 2
1. Понятие компьютерная сеть
2. Классификация компьютерных сетей
Дата публикования: 2015-04-09; Прочитано: 259 | Нарушение авторского права страницы | Мы поможем в написании вашей работы!