Jump to content

Information systems security (INFOSEC) boundary: Difference between revisions

From Hackerpedia
imported>Unknown user
No edit summary
 
imported>Unknown user
No edit summary
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
{{LanguageHeader|en}}
{{LanguageHeader|en}}
{{CyberTerm|definition=An imaginary definable perimeter encompassing all the critical functions in an INFOSEC product and separating them from all other functions within the product. Note: INFOSEC Boundary is in terms of a product assessment; not to be confused with authorization boundary.|source=CNSSI 4009-2015}}
{{CyberTerm|definition=An imaginary definable perimeter encompassing all the critical functions in an INFOSEC product and separating them from all other functions within the product.  
Note: INFOSEC Boundary is in terms of a product assessment; not to be confused with authorization boundary.|source=CNSSI 4009-2015}}

Latest revision as of 00:24, 20 January 2026

Languages: English | Français

Information systems security (INFOSEC) boundary

An imaginary definable perimeter encompassing all the critical functions in an INFOSEC product and separating them from all other functions within the product. Note: INFOSEC Boundary is in terms of a product assessment; not to be confused with authorization boundary.


Source: CNSSI 4009-2015 | Category: