23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Local Management Device/<strong>Key</strong><br />

Processor (LMD/KP) –<br />

Local Registration Authority –<br />

(LRA)<br />

EKMS platform providing automated management <strong>of</strong> COMSEC<br />

material and generating key for designated users.<br />

SOURCE: CNSSI-4009<br />

A Registration Authority with responsibility for a local community.<br />

SOURCE: SP 800-32<br />

A Registration Authority with responsibility for a local community in<br />

a PKI-enabled environment.<br />

SOURCE: CNSSI-4009<br />

Logic Bomb – A piece <strong>of</strong> code intentionally inserted into a s<strong>of</strong>tware system that will<br />

set <strong>of</strong>f a malicious function when specified conditions are met.<br />

SOURCE: CNSSI-4009<br />

Logical Completeness Measure – Means for assessing the effectiveness and degree to which a set <strong>of</strong><br />

security and access control mechanisms meets security specifications.<br />

SOURCE: CNSSI-4009<br />

Logical Perimeter – A conceptual perimeter that extends to all intended users <strong>of</strong> the<br />

system, both directly and indirectly connected, who receive output<br />

from the system without a reliable human review by an appropriate<br />

authority. The location <strong>of</strong> such a review is commonly referred to as<br />

an “air gap.”<br />

SOURCE: CNSSI-4009<br />

Long Title – Descriptive title <strong>of</strong> a COMSEC item.<br />

SOURCE: CNSSI-4009<br />

Low Impact – The loss <strong>of</strong> confidentiality, integrity, or availability that could be<br />

expected to have a limited adverse effect on organizational<br />

operations, organizational assets, individuals, other organizations, or<br />

the national security interests <strong>of</strong> the United States; (i.e., 1) causes a<br />

degradation in mission capability to an extent and duration that the<br />

organization is able to perform its primary functions, but the<br />

effectiveness <strong>of</strong> the functions is noticeably reduced; 2) results in<br />

minor damage to organizational assets; 3) results in minor financial<br />

loss; or 4) results in minor harm to individuals).<br />

SOURCE: CNSSI-4009<br />

Low-Impact System – An information system in which all three security objectives (i.e.,<br />

confidentiality, integrity, and availability) are assigned a FIPS 199<br />

potential impact value <strong>of</strong> low.<br />

SOURCE: SP 800-37; SP 800-53; SP 800-60; FIPS 200<br />

Pg 113

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!