23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Least Trust – The principal that a security architecture should be designed in a way<br />

that minimizes 1) the number <strong>of</strong> components that require trust, and 2)<br />

the extent to which each component is trusted.<br />

SOURCE: CNSSI-4009<br />

Level <strong>of</strong> Concern – Rating assigned to an information system indicating the extent to<br />

which protection measures, techniques, and procedures must be<br />

applied. High, Medium, and Basic are identified levels <strong>of</strong> concern.<br />

A separate Level-<strong>of</strong>-Concern is assigned to each information system<br />

for confidentiality, integrity, and availability.<br />

SOURCE: CNSSI-4009<br />

Level <strong>of</strong> Protection – Extent to which protective measures, techniques, and procedures<br />

must be applied to information systems and networks based on risk,<br />

threat, vulnerability, system interconnectivity considerations, and<br />

information assurance needs. Levels <strong>of</strong> protection are: 1. Basic:<br />

information systems and networks requiring implementation <strong>of</strong><br />

standard minimum security countermeasures. 2. Medium:<br />

information systems and networks requiring layering <strong>of</strong> additional<br />

safeguards above the standard minimum security countermeasures. 3.<br />

High: information systems and networks requiring the most stringent<br />

protection and rigorous security countermeasures.<br />

SOURCE: CNSSI-4009<br />

Likelihood <strong>of</strong> Occurrence – In <strong>Information</strong> Assurance risk analysis, a weighted factor based on a<br />

subjective analysis <strong>of</strong> the probability that a given threat is capable <strong>of</strong><br />

exploiting a given vulnerability.<br />

SOURCE: CNSSI-4009<br />

Limited Maintenance – COMSEC maintenance restricted to fault isolation, removal, and<br />

replacement <strong>of</strong> plug-in assemblies. Soldering or unsoldering usually<br />

is prohibited in limited maintenance. See full maintenance.<br />

SOURCE: CNSSI-4009<br />

Line Conditioning – Elimination <strong>of</strong> unintentional signals or noise induced or conducted on<br />

a telecommunications or information system signal, power, control,<br />

indicator, or other external interface line.<br />

SOURCE: CNSSI-4009<br />

Line Conduction – Unintentional signals or noise induced or conducted on a<br />

telecommunications or information system signal, power, control,<br />

indicator, or other external interface line.<br />

SOURCE: CNSSI-4009<br />

Pg 111

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!