Class 726 | INFORMATION SECURITY |
Click here for a printable version of this file |
Expand/Contract Processing Please Wait
1 | POLICY |
2 | ACCESS CONTROL OR AUTHENTICATION |
3 | Network |
4 | Authorization |
5 | Credential |
6 | Management |
7 | Usage |
8 | Global (e.g., Single Sign On (SSO), etc.) |
9 | Tokens (e.g., smartcards or dongles, etc.) |
10 | Tickets (e.g., Kerberos or certificates, etc.) |
11 | Firewall |
16 | Stand-alone |
21 | Authorization |
22 | MONITORING OR SCANNING OF SOFTWARE OR DATA INCLUDING ATTACK PREVENTION |
26 | PREVENTION OF UNAUTHORIZED USE OF DATA INCLUDING PREVENTION OF PIRACY, PRIVACY VIOLATIONS, OR UNAUTHORIZED DATA MODIFICATION |
27 | Access control |
31 | Limitations on number or amount of copies |
32 | Copy detection |
33 | Copy inactivation |
34 | PROTECTION OF HARDWARE |