Information systems security (INFOSEC) boundary: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
| (2 intermediate revisions by the same user not shown) | |||
| Line 1: | Line 1: | ||
{{LanguageHeader|en}} | {{LanguageHeader|en}} | ||
{{CyberTerm|definition=An imaginary definable perimeter encompassing all the critical functions in an INFOSEC product and separating them from all other functions within the product. Note: INFOSEC Boundary is in terms of a product assessment; not to be confused with authorization boundary.|source=CNSSI 4009-2015}} | {{CyberTerm|definition=An imaginary definable perimeter encompassing all the critical functions in an INFOSEC product and separating them from all other functions within the product. | ||
Note: INFOSEC Boundary is in terms of a product assessment; not to be confused with authorization boundary.|source=CNSSI 4009-2015}} | |||
Latest revision as of 00:24, 20 January 2026
Information systems security (INFOSEC) boundary
An imaginary definable perimeter encompassing all the critical functions in an INFOSEC product and separating them from all other functions within the product. Note: INFOSEC Boundary is in terms of a product assessment; not to be confused with authorization boundary.
Source: CNSSI 4009-2015 | Category: