Cascading

Downward flow of information through a range of security levels greater than the accreditation range of a system, network, or component.


Cascading

Downward flow of information through a range of security levels greater than the accreditation range of a system, network, or component.

Used in methodology