Difference between revisions of "Major Application"
Jump to navigation
Jump to search
Line 1: | Line 1: | ||
− | |||
{| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px" | {| style="margin-left: 0px; text-align: left; font-style: none; width:100%; font-weight: none; background: #F0F0F0; border:1px" | ||
|- | |- | ||
− | | '''1.''' A Major Application is an application that requires special attention to security due to the [[Risk|risk]] and magnitude of the harm resulting from the [[Loss|loss]], misuse, or unauthorized access to, or modification of, the information in the application. <div class="thumb tright"> | + | | '''1.''' A Major Application is an application that requires special attention to security due to the [[Risk|risk]] and magnitude of the harm resulting from the [[Loss|loss]], misuse, or unauthorized access to, or modification of, the information in the application. |
+ | {{Template:BL-DR-5Banner}} | ||
+ | <div class="thumb tright"> | ||
{{#ev:youtube|rbPl0XU0RQ0|350}} | {{#ev:youtube|rbPl0XU0RQ0|350}} | ||
</div> | </div> | ||
− | Related Terms: [[Classification_of_Systems|Classification of Systems]]<br/> '''Note:''' A breach in a major application might comprise many individual application [[Program|programs]] and hardware, software, and telecommunications components. Major applications can be either a major software application or a combination of hardware/software where the only purpose of the [[System|system]] is to support a specific mission-related function. br><br/> | + | '''Related Terms''': [[Classification_of_Systems|Classification of Systems]]<br/> '''Note:''' A breach in a major application might comprise many individual application [[Program|programs]] and hardware, software, and telecommunications components. Major applications can be either a major software application or a combination of hardware/software where the only purpose of the [[System|system]] is to support a specific mission-related function. br><br/><br/> {{BcmBoK 3 CL 2B}}<br/> <br/> {{BcmBoK 3 CL 2C}}<br/> <br/> {{BcmBoK 3 CL 2D}} |
− | + | <br> <br> <br> <br> <br> <br> | |
− | |||
− | |||
− | |||
− | |||
+ | {{Template:BLCoursesBanner}} | ||
+ | {{Bcm Institute Source}} | ||
|} | |} | ||
− | {{ | + | {{Template: BookMGITDRPlan}} |
− | |||
[[Category:BCM Institute Glossary]] [[Category:BCM Institute Crisis Communication Glossary]] [[Category:BCM Institute DR Glossary]] [[Category:BcmBoK 3 CL 2B]] [[Category:BcmBoK 3 CL 2C]] [[Category:BcmBoK 3 CL 2D]] | [[Category:BCM Institute Glossary]] [[Category:BCM Institute Crisis Communication Glossary]] [[Category:BCM Institute DR Glossary]] [[Category:BcmBoK 3 CL 2B]] [[Category:BcmBoK 3 CL 2C]] [[Category:BcmBoK 3 CL 2D]] |
Latest revision as of 07:30, 27 October 2020
1. A Major Application is an application that requires special attention to security due to the risk and magnitude of the harm resulting from the loss, misuse, or unauthorized access to, or modification of, the information in the application.
Related Terms: Classification of Systems
|