23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Line <strong>of</strong> Business – The following OMB-defined process areas common to virtually<br />

all federal agencies: Case Management, Financial Management,<br />

Grants Management, Human Resources Management, Federal<br />

Health Architecture, <strong>Information</strong> Systems <strong>Security</strong>, Budget<br />

Formulation and Execution, Geospatial, and IT Infrastructure.<br />

SOURCE: SP 800-53<br />

“Lines <strong>of</strong> business” or “areas <strong>of</strong> operation” describe the purpose <strong>of</strong><br />

government in functional terms or describe the support functions that<br />

the government must conduct in order to effectively deliver services<br />

to citizens. Lines <strong>of</strong> business relating to the purpose <strong>of</strong> government<br />

and the mechanisms the government uses to achieve its purposes tend<br />

to be mission-based. Lines <strong>of</strong> business relating to support functions<br />

and resource management functions that are necessary to conduct<br />

government operations tend to be common to most agencies. The<br />

recommended information types provided in NIST SP 800-60 are<br />

established from the “business areas” and “lines <strong>of</strong> business” from<br />

OMB’s Business Reference Model (BRM) section <strong>of</strong> Federal<br />

Enterprise Architecture (FEA) Consolidated Reference Model<br />

Document Version 2.3<br />

SOURCE: SP 800-60<br />

Link Encryption – Link encryption encrypts all <strong>of</strong> the data along a communications path<br />

(e.g., a satellite link, telephone circuit, or T1 line). Since link<br />

encryption also encrypts routing data, communications nodes need to<br />

decrypt the data to continue routing.<br />

SOURCE: SP 800-12<br />

Encryption <strong>of</strong> information between nodes <strong>of</strong> a communications<br />

system.<br />

SOURCE: CNSSI-4009<br />

List-Oriented – <strong>Information</strong> system protection in which each protected object has a<br />

list <strong>of</strong> all subjects authorized to access it.<br />

SOURCE: CNSSI-4009<br />

Local Access – Access to an organizational information system by a user (or<br />

process acting on behalf <strong>of</strong> a user) communicating through a<br />

direct connection without the use <strong>of</strong> a network.<br />

SOURCE: SP 800-53; CNSSI-4009<br />

Local Authority – Organization responsible for generating and signing user certificates<br />

in a PKI-enabled environment.<br />

SOURCE: CNSSI-4009<br />

Pg 112

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!