Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology
暂无分享,去创建一个
A triggering transformer having windings surrounding a photographic flash tube fires the latter when the transformer primary winding is energized by the closure of a switch. This switch closure also turns off a transistor which then unblocks a light sensitive integrator including an LASCR which receives the flash tube light by reflection. When the integrator has received a predetermined quantity of light, the LASCR turns on and energizes the primary winding of a second triggering transformer having windings surrounding a quench tube connected in parallel with the flash tube. This fires the quench tube which in turn extinguishes the flash tube.
[1] Dennis Gilbert,et al. Sample Statement of Work for Federal Computer Security Services: For use In-House or Contracting Out , 1991 .
[2] Marianne Swanson,et al. SP 800-14. Generally Accepted Principles and Practices for Securing Information Technology Systems , 1996 .
[3] Marianne Swanson,et al. Guide for Developing Security Plans for Information Technology Systems , 1998 .
[4] Marianne Swanson,et al. Security Self-Assessment Guide for Information Technology Systems , 2001 .