Skip to Main Content
Apply
Quicklinks
Search
A-Z Index
BengalWeb
Campus Map
Directory
Email
Events
Library
Moodle
News
Give
Admissions
Students
Faculty & Staff
Parents
Alumni & Visitors
Academic Calendar
Academic Catalogs
Administration
Advising
Athletics
Campus Security
Career Center
Class Schedule
Colleges & Departments
Financial Aid
Health & Wellness
Housing
Human Resources
Jobs
Museum of Natural History
Parking
Registrar
Scholarships
Transcripts
Tuition
Majors
Cost
Visit
Parking
Map
Apply
Give
Search
Common Searches
BengalWeb
Bookstore
Academic Calendar
Directory
COVID-19
Jobs
Human Resources
Moodle
Calendar
Tuition
JavaScriptMessages
IRI
Informatics Research Institute
News
SiteMap
Login
Glossary
Filter:
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
All
Return to List
Z
Z
Z Time
Zap
Zapped
Zen
Zero
Zero Suppression
Zero-Bit Insertion
Zero-Content
Zerofill
Zeroize
Zeroth
Zigamorph
Zip
Zipperhead
Zombie
Zone Of Control/Zoning
Zorch
Zork
Zorkmid
Zulu Time
Zone Of Control/Zoning
Zone of control is the three dimensional space surrounding equipment that process national security information within which unauthorized personnel (1) are denied unrestricted access and (2) are either escorted by authorized personnel or are under continuous physical or electronic surveillance. Zoning is a concept in which a defined area within a facility has been approved for the operation of equipment with appropriate TEMPEST Characteristics without emanating classified electromagnetic radiation beyond the controlled space boundary of the facility. The zones are determined by measuring electromagnetic attenuation provided by a building's physical properties and the free space loss to the controlled space boundary. Equipment zone ratings are based on the level of compromising emanations produced by the equipment. (Source -panel of experts) 2. A technique in which a protected building is divided into area: any alarm initiating device can be programmed to signal an identifying code and or indicate on an annunciator the type of problem (fire, flooding, physical penetration, etc). (Source: Information Security: Dictionary of Concepts, Standards and Terms; Longley, Shain, Caelli; Macmillan, 1992)