Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

A  |  B  |  C  |  D  |  E  |  F  |  G  |  H  |  I  |  J  |  K  |  L  |  M  |  N  |  O  |  P  |  Q  |  R  |  S  |  T  |  U  |  V  |  W  |  X  |  Y  |  Z

object

Abbreviations / Acronyms / Synonyms:

Object, Assessment

Definitions:

  Passive information system-related entity (e.g., devices, files, records, tables, processes, programs, domains) containing or receiving information. Access to an object (by a subject) implies access to the information it contains. See subject.
Sources:
CNSSI 4009-2015

  Passive system-related entity, including devices, files, records, tables, processes, programs, and domains that contain or receive information. Access to an object (by a subject) implies access to the information it contains. See subject.
Sources:
NIST SP 800-53 Rev. 5

  An entity to be protected from unauthorized use.
Sources:
NIST SP 800-162

  An operating system abstraction that is visible at the application program interface, has a unique name, and capable of being shared.  In this document, the following are resources: files, programs, directories, databases, mini-disks, and special files.  In this document, the following are not resources: records, blocks, pages, segments, bits, bytes, words, fields, and processors.
Sources:
NISTIR 5153 under Resource

  the set of passive entities within the system, protected from unauthorized use.
Sources:
NISTIR 6192 under Object

  A passive entity that contains or receives information.
Sources:
NISTIR 7316 under Object

  See Object, Assessment.
Sources:
NISTIR 8011 Vol. 1 under Object

  Assessment objects identify the specific items being assessed, and as such, can have one or more security defects. Assessment objects include specifications, mechanisms, activities, and individuals which in turn may include, but are not limited to, devices, software products, software executables, credentials, accounts, account-privileges, things to which privileges are granted (including data and physical facilities), etc. See SP 800-53A.
Sources:
NISTIR 8011 Vol. 1 under Object, Assessment