14:43 Mar 7, 2004 |
Polish to English translations [PRO] Telecom(munications) / IT & telecom | |||||||
---|---|---|---|---|---|---|---|
|
| ||||||
| Selected response from: Andrzej Lejman Poland Local time: 07:22 | ||||||
Grading comment
|
Summary of answers provided | ||||
---|---|---|---|---|
4 +1 | Classified networks |
| ||
5 -1 | secure networks |
|
Discussion entries: 6 | |
---|---|
Classified networks Explanation: The labs' classified computers are separated from other computers by an "air gap"--an actual physical separation--but there are other ways secret information can make its way from classified computers to open computers, such as ordinary floppy disks. Proste? ;-) -------------------------------------------------- Note added at 2004-03-07 15:44:03 (GMT) -------------------------------------------------- Tu nie ma nad czym myśleć - to masz dokument z US Department of State: 12 FAM 653.6 Data Confidentiality (TL:DS-51; 4-12-96) a. Networked AISs must protect data from unauthorized disclosure during storage and transmission. b. Classified networks must use equipment approved by the National Security Agency to achieve end-to-end data encryption when transmitting outside secure areas. c. Classified AISs may use protected distribution systems or the equivalent security controls when transmitting within a secured area. Note: DTS/1A contains additional information. d. Classified AISs must address the implementation of countermeasures to prevent data disclosure through compromising emanations (TEMPEST). Note: Additional guidance is contained in National Telecommunications and Information System Security Policy 300 (NTISSP 300) entitled “National Policy on Control of Compromising Emanations.” e. Classified networks must implement communications security procedures per subchapter 12 FAM 660 . http://foia.state.gov/masterdocs/12fam/12m0650.pdf -------------------------------------------------- Note added at 2004-03-07 17:51:44 (GMT) -------------------------------------------------- Maciek, wychodzi na to, że najbezpieczniejszy seks to szklanka wody zamiast. Nieważne, jak działa, ale bezpieczne. Ja nie kwestionuję istnienia terminu \"secure network\" czy \"secure connectivity\". To oczywiście bezpieczna łączność, szyfrowana itd. W zakres tego pojecia wchodzi jeszcze odpowiednio wysoki stopień dostępności, czyli redundatność sprzętowa etc. Ale pytanie było o sieci NIEJAWNE, czyli inaczej mówiąc wydzielone. Tu dochodzi element fizycznego oddzielenia od publicznej infrastruktury. Żeby przesłać dane na zewnątrz, musisz je skopiować na jakiś nośnik i wysłać z innego urządzenia. Reference: http://news.com.com/2100-1001_3-224033.html |
| |