Term:Boundary Protection Device

From FISMApedia
Revision as of 00:38, 27 October 2009 by DanPhilpott (talk) (1 revision)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search

NIST SP 800-39 Draft 2

Boundary Protection Device - A device with appropriate mechanisms that: (i) facilitates the adjudication of different interconnected system security policies (e.g., controlling the flow of information into or out of an interconnected system); and/or (ii) monitors and controls communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications. [[Term:Boundary protection | Boundary protection]] devices include such components as proxies, gateways, routers, firewalls, guards, and encrypted tunnels.

NIST SP 800-53A

Boundary Protection Device - A device with appropriate mechanisms that: (i) facilitates the adjudication of different interconnected system security policies (e.g., controlling the flow of information into or out of an interconnected system); and/or (ii) monitors and controls communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications. [[Term:Boundary protection | Boundary protection]] devices include such components as proxies, gateways, routers, firewalls, guards, and encrypted tunnels.

NIST SP 800-53r1

Boundary Protection Device - A device with appropriate mechanisms that: (i) facilitates the adjudication of different interconnected system security policies (e.g., controlling the flow of information into or out of an interconnected system); and/or (ii) monitors and controls communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications. [[Term:Boundary protection | Boundary protection]] devices include such components as proxies, gateways, routers, firewalls, guards, and encrypted tunnels.

NIST SP 800-53r2

Boundary Protection Device - A device with appropriate mechanisms that: (i) facilitates the adjudication of different interconnected system security policies (e.g., controlling the flow of information into or out of an interconnected system); and/or (ii) monitors and controls communications at the external boundary of an information system to prevent and detect malicious and other unauthorized communications. [[Term:Boundary protection | Boundary protection]] devices include such components as proxies, gateways, routers, firewalls, guards, and encrypted tunnels.

NIST SP 800-53r3

Boundary Protection Device - A device with appropriate mechanisms that: (i) facilitates the adjudication of different interconnected system security policies (e.g., controlling the flow of information into or out of an interconnected system); and/or (ii) provides information system [[Term:boundary protection | boundary protection]].