14.04.2014 Views

DoD Directive 8500.1 - Common Access Card (CAC)

DoD Directive 8500.1 - Common Access Card (CAC)

DoD Directive 8500.1 - Common Access Card (CAC)

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

DODD <strong>8500.1</strong>, October 24, 2002<br />

E2. ENCLOSURE 2<br />

DEFINITIONS<br />

E2.1.1. Application. Software program that performs a specific function directly<br />

for a user and can be executed without access to system control, monitoring or<br />

administrative privileges. Examples include office automation, electronic mail, web<br />

services, and major functional or mission software programs.<br />

E2.1.2. Authentication. Security measure designed to establish the validity of a<br />

transmission, message, or originator, or a means of verifying an individual's<br />

authorization to receive specific categories of information (reference (i)).<br />

E2.1.3. Authorized User. Any appropriately cleared individual with a requirement<br />

to access a <strong>DoD</strong> information system in order to perform or assist in a lawful and<br />

authorized governmental function.<br />

E2.1.4. Availability. Timely, reliable access to data and information services for<br />

authorized users (reference (i)).<br />

E2.1.5. Community Risk. Probability that a particular vulnerability will be<br />

exploited within an interacting population and adversely impact some members of that<br />

population.<br />

E2.1.6. Computer Network. The constituent element of an enclave responsible<br />

for connecting computing environments by providing short-haul data transport<br />

capabilities such as local or campus area networks, or long-haul data transport<br />

capabilities such as operational, metropolitan or wide area and backbone networks.<br />

E2.1.7. Computing Environment. Workstation or server (host) and its operating<br />

system, peripherals, and applications (reference (i)).<br />

E2.1.8. Confidentiality. Assurance that information is not disclosed to<br />

unauthorized entities or processes (reference (i)).<br />

E2.1.9. Connection Approval. Formal authorization to interconnect information<br />

systems.<br />

E2.1.10. Controlled Unclassified Information. A term used, but not specifically<br />

defined in reference (o), to refer to sensitive information as defined in paragraph<br />

E2.1.40., below.<br />

17 ENCLOSURE 2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!