Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Download
Faster access than browser!
 

XTS-400

Index XTS-400

The XTS-400 is a multilevel secure computer operating system. [1]

70 relations: Access control list, Address space, Application programming interface, Authentication, BAE Systems, Bell–LaPadula model, Biba Model, Booting, Central processing unit, Command-line interface, Commercial off-the-shelf, Common Criteria, Computer hardware, Computer multitasking, Computer virus, Controlled Access Protection Profile, Conventional PCI, Cross-domain solution, Discretionary access control, Ethernet, File system, Fortezza, Gigabit Ethernet, Graphical user interface, Hard disk drive, Input/output, Intel, Inter-process communication, Internet protocol suite, IPv4, IPv6, Kernel (operating system), Labeled Security Protection Profile, Linux, Malware, Memory management, Monolithic kernel, Multi-user software, Multilevel security, Multiple single-level, National Security Agency, Naval Postgraduate School, NSA product types, Operating system, PC Card, Pentium 4, Physical security, Proprietary software, Rainbow Series, Reference monitor, ..., Role-based access control, SCSI, SCSI host adapter, Security kernel, Security policy, Spoofing attack, Trojan horse (computing), Trusted Computer System Evaluation Criteria, Trusted operating system, Trusted path, Uninterruptible power supply, United States, United States Department of Defense, United States Patent and Trademark Office, Unix, Unix-like, X Window System, X86, Xeon, 19-inch rack. Expand index (20 more) »

Access control list

An access control list (ACL), with respect to a computer file system, is a list of permissions attached to an object.

New!!: XTS-400 and Access control list · See more »

Address space

In computing, an address space defines a range of discrete addresses, each of which may correspond to a network host, peripheral device, disk sector, a memory cell or other logical or physical entity.

New!!: XTS-400 and Address space · See more »

Application programming interface

In computer programming, an application programming interface (API) is a set of subroutine definitions, protocols, and tools for building software.

New!!: XTS-400 and Application programming interface · See more »

Authentication

Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.

New!!: XTS-400 and Authentication · See more »

BAE Systems

BAE Systems plc is a British multinational defence, security, and aerospace company.

New!!: XTS-400 and BAE Systems · See more »

Bell–LaPadula model

The Bell–LaPadula Model (BLP) is a state machine model used for enforcing access control in government and military applications.

New!!: XTS-400 and Bell–LaPadula model · See more »

Biba Model

The Biba Model or Biba Integrity Model developed by Kenneth J. Biba in 1975, is a formal state transition system of computer security policy that describes a set of access control rules designed to ensure data integrity.

New!!: XTS-400 and Biba Model · See more »

Booting

In computing, booting is starting up a computer or computer appliance until it can be used.

New!!: XTS-400 and Booting · See more »

Central processing unit

A central processing unit (CPU) is the electronic circuitry within a computer that carries out the instructions of a computer program by performing the basic arithmetic, logical, control and input/output (I/O) operations specified by the instructions.

New!!: XTS-400 and Central processing unit · See more »

Command-line interface

A command-line interface or command language interpreter (CLI), also known as command-line user interface, console user interface and character user interface (CUI), is a means of interacting with a computer program where the user (or client) issues commands to the program in the form of successive lines of text (command lines).

New!!: XTS-400 and Command-line interface · See more »

Commercial off-the-shelf

Commercial off-the-shelf or commercially available off-the-shelf (COTS) satisfy the needs of the purchasing organization, without the need to commission custom-made, or bespoke, solutions.

New!!: XTS-400 and Commercial off-the-shelf · See more »

Common Criteria

The Common Criteria for Information Technology Security Evaluation (abbreviated as Common Criteria or CC) is an international standard (ISO/IEC 15408) for computer security certification.

New!!: XTS-400 and Common Criteria · See more »

Computer hardware

Computer hardware includes the physical parts or components of a computer, such as the central processing unit, monitor, keyboard, computer data storage, graphic card, sound card and motherboard.

New!!: XTS-400 and Computer hardware · See more »

Computer multitasking

In computing, multitasking is the concurrent execution of multiple tasks (also known as processes) over a certain period of time.

New!!: XTS-400 and Computer multitasking · See more »

Computer virus

A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.

New!!: XTS-400 and Computer virus · See more »

Controlled Access Protection Profile

The Controlled Access Protection Profile, also known as CAPP, is a Common Criteria security profile that specifies a set of functional and assurance requirements for information technology products.

New!!: XTS-400 and Controlled Access Protection Profile · See more »

Conventional PCI

Conventional PCI, often shortened to PCI, is a local computer bus for attaching hardware devices in a computer.

New!!: XTS-400 and Conventional PCI · See more »

Cross-domain solution

A cross-domain solution (CDS) is a means of information assurance that provides the ability to manually or automatically access or transfer information between two or more differing security domains.

New!!: XTS-400 and Cross-domain solution · See more »

Discretionary access control

In computer security, discretionary access control (DAC) is a type of access control defined by the Trusted Computer System Evaluation Criteria "as a means of restricting access to objects based on the identity of subjects and/or groups to which they belong.

New!!: XTS-400 and Discretionary access control · See more »

Ethernet

Ethernet is a family of computer networking technologies commonly used in local area networks (LAN), metropolitan area networks (MAN) and wide area networks (WAN).

New!!: XTS-400 and Ethernet · See more »

File system

In computing, a file system or filesystem controls how data is stored and retrieved.

New!!: XTS-400 and File system · See more »

Fortezza

Fortezza is an information security system that uses the Fortezza Crypto Card, a PC Card-based security token.

New!!: XTS-400 and Fortezza · See more »

Gigabit Ethernet

In computer networking, Gigabit Ethernet (GbE or 1 GigE) is a term describing various technologies for transmitting Ethernet frames at a rate of a gigabit per second (1,000,000,000 bits per second), as defined by the IEEE 802.3-2008 standard.

New!!: XTS-400 and Gigabit Ethernet · See more »

Graphical user interface

The graphical user interface (GUI), is a type of user interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation, instead of text-based user interfaces, typed command labels or text navigation.

New!!: XTS-400 and Graphical user interface · See more »

Hard disk drive

A hard disk drive (HDD), hard disk, hard drive or fixed disk is an electromechanical data storage device that uses magnetic storage to store and retrieve digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.

New!!: XTS-400 and Hard disk drive · See more »

Input/output

In computing, input/output or I/O (or, informally, io or IO) is the communication between an information processing system, such as a computer, and the outside world, possibly a human or another information processing system.

New!!: XTS-400 and Input/output · See more »

Intel

Intel Corporation (stylized as intel) is an American multinational corporation and technology company headquartered in Santa Clara, California, in the Silicon Valley.

New!!: XTS-400 and Intel · See more »

Inter-process communication

In computer science, inter-process communication or interprocess communication (IPC) refers specifically to the mechanisms an operating system provides to allow the processes to manage shared data.

New!!: XTS-400 and Inter-process communication · See more »

Internet protocol suite

The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.

New!!: XTS-400 and Internet protocol suite · See more »

IPv4

Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP).

New!!: XTS-400 and IPv4 · See more »

IPv6

Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet.

New!!: XTS-400 and IPv6 · See more »

Kernel (operating system)

The kernel is a computer program that is the core of a computer's operating system, with complete control over everything in the system.

New!!: XTS-400 and Kernel (operating system) · See more »

Labeled Security Protection Profile

Labeled Security Protection Profile (LSPP) is a protection profile within the Common Criteria for Information Technology Security Evaluation, a set of security functional and assurance requirements for IT products.

New!!: XTS-400 and Labeled Security Protection Profile · See more »

Linux

Linux is a family of free and open-source software operating systems built around the Linux kernel.

New!!: XTS-400 and Linux · See more »

Malware

Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.

New!!: XTS-400 and Malware · See more »

Memory management

Memory management is a form of resource management applied to computer memory.

New!!: XTS-400 and Memory management · See more »

Monolithic kernel

A monolithic kernel is an operating system architecture where the entire operating system is working in kernel space and is alone in supervisor mode.

New!!: XTS-400 and Monolithic kernel · See more »

Multi-user software

Multi-user software is software that allows access by multiple users of a computer.

New!!: XTS-400 and Multi-user software · See more »

Multilevel security

Multilevel security or multiple levels of security (MLS) is the application of a computer system to process information with incompatible classifications (i.e., at different security levels), permit access by users with different security clearances and needs-to-know, and prevent users from obtaining access to information for which they lack authorization.

New!!: XTS-400 and Multilevel security · See more »

Multiple single-level

Multiple single-level or multi-security level (MSL) is a means to separate different levels of data by using separate computers or virtual machines for each level.

New!!: XTS-400 and Multiple single-level · See more »

National Security Agency

The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence.

New!!: XTS-400 and National Security Agency · See more »

Naval Postgraduate School

The Naval Postgraduate School (NPS) is a graduate school operated by the United States Navy.

New!!: XTS-400 and Naval Postgraduate School · See more »

NSA product types

The U.S. National Security Agency (NSA) ranks cryptographic products or algorithms by a certification called product types.

New!!: XTS-400 and NSA product types · See more »

Operating system

An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.

New!!: XTS-400 and Operating system · See more »

PC Card

In computing, PC Card is a configuration for computer parallel communication peripheral interface, designed for laptop computers.

New!!: XTS-400 and PC Card · See more »

Pentium 4

Pentium 4 is a brand by Intel for an entire series of single-core CPUs for desktops, laptops and entry-level servers.

New!!: XTS-400 and Pentium 4 · See more »

Physical security

Physical security describes security measures that are designed to deny unauthorized access to facilities, equipment and resources and to protect personnel and property from damage or harm (such as espionage, theft, or terrorist attacks).

New!!: XTS-400 and Physical security · See more »

Proprietary software

Proprietary software is non-free computer software for which the software's publisher or another person retains intellectual property rights—usually copyright of the source code, but sometimes patent rights.

New!!: XTS-400 and Proprietary software · See more »

Rainbow Series

The Rainbow Series (sometimes known as the Rainbow Books) is a series of computer security standards and guidelines published by the United States government in the 1980s and 1990s.

New!!: XTS-400 and Rainbow Series · See more »

Reference monitor

In operating systems architecture a reference monitor concept defines a set of design requirements on a reference validation mechanism, which enforces an access control policy over subjects' (e.g., processes and users) ability to perform operations (e.g., read and write) on objects (e.g., files and sockets) on a system.

New!!: XTS-400 and Reference monitor · See more »

Role-based access control

In computer systems security, role-based access control (RBAC) is an approach to restricting system access to authorized users.

New!!: XTS-400 and Role-based access control · See more »

SCSI

Small Computer System Interface (SCSI) is a set of standards for physically connecting and transferring data between computers and peripheral devices.

New!!: XTS-400 and SCSI · See more »

SCSI host adapter

A SCSI host adapter is a device used to connect one or more other SCSI devices to a computer bus.

New!!: XTS-400 and SCSI host adapter · See more »

Security kernel

In telecommunication, the term security kernel has the following meanings.

New!!: XTS-400 and Security kernel · See more »

Security policy

Security policy is a definition of what it means to be secure for a system, organization or other entity.

New!!: XTS-400 and Security policy · See more »

Spoofing attack

In the context of network security, a spoofing attack is a situation in which a person or program successfully masquerades as another by falsifying data, to gain an illegitimate advantage.

New!!: XTS-400 and Spoofing attack · See more »

Trojan horse (computing)

In computing, a Trojan horse, or Trojan, is any malicious computer program which misleads users of its true intent.

New!!: XTS-400 and Trojan horse (computing) · See more »

Trusted Computer System Evaluation Criteria

Trusted Computer System Evaluation Criteria (TCSEC) is a United States Government Department of Defense (DoD) standard that sets basic requirements for assessing the effectiveness of computer security controls built into a computer system.

New!!: XTS-400 and Trusted Computer System Evaluation Criteria · See more »

Trusted operating system

Trusted Operating System (TOS) generally refers to an operating system that provides sufficient support for multilevel security and evidence of correctness to meet a particular set of government requirements.

New!!: XTS-400 and Trusted operating system · See more »

Trusted path

A trusted path or trusted channel is a mechanism that provides confidence that the user is communicating with what the user intended to communicate with, ensuring that attackers can't intercept or modify whatever information is being communicated.

New!!: XTS-400 and Trusted path · See more »

Uninterruptible power supply

An uninterruptible power supply or uninterruptible power source (UPS) is an electrical apparatus that provides emergency power to a load when the input power source or mains power fails.

New!!: XTS-400 and Uninterruptible power supply · See more »

United States

The United States of America (USA), commonly known as the United States (U.S.) or America, is a federal republic composed of 50 states, a federal district, five major self-governing territories, and various possessions.

New!!: XTS-400 and United States · See more »

United States Department of Defense

The Department of Defense (DoD, USDOD, or DOD) is an executive branch department of the federal government of the United States charged with coordinating and supervising all agencies and functions of the government concerned directly with national security and the United States Armed Forces.

New!!: XTS-400 and United States Department of Defense · See more »

United States Patent and Trademark Office

The United States Patent and Trademark Office (USPTO) is an agency in the U.S. Department of Commerce that issues patents to inventors and businesses for their inventions, and trademark registration for product and intellectual property identification.

New!!: XTS-400 and United States Patent and Trademark Office · See more »

Unix

Unix (trademarked as UNIX) is a family of multitasking, multiuser computer operating systems that derive from the original AT&T Unix, development starting in the 1970s at the Bell Labs research center by Ken Thompson, Dennis Ritchie, and others.

New!!: XTS-400 and Unix · See more »

Unix-like

A Unix-like (sometimes referred to as UN*X or *nix) operating system is one that behaves in a manner similar to a Unix system, while not necessarily conforming to or being certified to any version of the Single UNIX Specification.

New!!: XTS-400 and Unix-like · See more »

X Window System

The X Window System (X11, or shortened to simply X) is a windowing system for bitmap displays, common on UNIX-like computer operating systems.

New!!: XTS-400 and X Window System · See more »

X86

x86 is a family of backward-compatible instruction set architectures based on the Intel 8086 CPU and its Intel 8088 variant.

New!!: XTS-400 and X86 · See more »

Xeon

Xeon is a brand of x86 microprocessors designed, manufactured, and marketed by Intel, targeted at the non-consumer workstation, server, and embedded system markets.

New!!: XTS-400 and Xeon · See more »

19-inch rack

A 19-inch rack is a standardized frame or enclosure for mounting multiple electronic equipment modules.

New!!: XTS-400 and 19-inch rack · See more »

Redirects here:

Secure Trusted Operating Program.

References

[1] https://en.wikipedia.org/wiki/XTS-400

OutgoingIncoming
Hey! We are on Facebook now! »