Information systems security (INFOSEC) boundary: Difference between revisions
Appearance
imported>Unknown user No edit summary |
imported>Unknown user No edit summary |
||
| Line 1: | Line 1: | ||
{{LanguageHeader|en}} | {{LanguageHeader|en}} | ||
{{CyberTerm|definition=An imaginary definable perimeter encompassing all the critical functions in an INFOSEC product and separating them from all other functions within the product. Note: INFOSEC Boundary is in terms of a product assessment; not to be confused with authorization boundary.|source=CNSSI 4009-2015}} | {{CyberTerm|definition=An imaginary definable perimeter encompassing all the critical functions in an INFOSEC product and separating them from all other functions within the product. | ||
Note: INFOSEC Boundary is in terms of a product assessment; not to be confused with authorization boundary.|source=CNSSI 4009-2015}} | |||
Revision as of 01:42, 15 January 2026
Information systems security (INFOSEC) boundary
An imaginary definable perimeter encompassing all the critical functions in an INFOSEC product and separating them from all other functions within the product. Note: INFOSEC Boundary is in terms of a product assessment; not to be confused with authorization boundary.
Source: CNSSI 4009-2015 | Category: