23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Internal <strong>Security</strong> Controls –<br />

Hardware, firmware, or s<strong>of</strong>tware features within an information<br />

system that restrict access to resources only to authorized subjects.<br />

SOURCE: CNSSI-4009<br />

Internal <strong>Security</strong> Testing – <strong>Security</strong> testing conducted from inside the organization’s security<br />

perimeter.<br />

SOURCE: SP 800-115<br />

Internet – The Internet is the single, interconnected, worldwide system <strong>of</strong><br />

commercial, governmental, educational, and other computer<br />

networks that share (a) the protocol suite specified by the Internet<br />

Architecture Board (IAB), and (b) the name and address spaces<br />

managed by the Internet Corporation for Assigned Names and<br />

Numbers (ICANN).<br />

SOURCE: CNSSI-4009<br />

Internet Protocol (IP) – Standard protocol for transmission <strong>of</strong> data from source to destinations<br />

in packet-switched communications networks and interconnected<br />

systems <strong>of</strong> such networks.<br />

SOURCE: CNSSI-4009<br />

Interoperability – For the purposes <strong>of</strong> this standard, interoperability allows any<br />

government facility or information system, regardless <strong>of</strong> the PIV<br />

Issuer, to verify a cardholder’s identity using the credentials on the<br />

PIV Card.<br />

SOURCE: FIPS 201<br />

Interview – A type <strong>of</strong> assessment method that is characterized by the process <strong>of</strong><br />

conducting discussions with individuals or groups within an<br />

organization to facilitate understanding, achieve clarification, or lead<br />

to the location <strong>of</strong> evidence, the results <strong>of</strong> which are used to support<br />

the determination <strong>of</strong> security control effectiveness over time.<br />

SOURCE: SP 800-53A<br />

Intranet – A private network that is employed within the confines <strong>of</strong> a given<br />

enterprise (e.g., internal to a business or agency).<br />

SOURCE: CNSSI-4009<br />

Intrusion – Unauthorized act <strong>of</strong> bypassing the security mechanisms <strong>of</strong> a system.<br />

SOURCE: CNSSI-4009<br />

Pg 101

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!