23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

An information system in which all three security properties (i.e.,<br />

confidentiality, integrity, and availability) are assigned a potential<br />

impact value <strong>of</strong> low.<br />

SOURCE: CNSSI-4009<br />

Low Probability <strong>of</strong> Detection – Result <strong>of</strong> measures used to hide or disguise intentional<br />

electromagnetic transmissions.<br />

SOURCE: CNSSI-4009<br />

Low Probability <strong>of</strong> Intercept – Result <strong>of</strong> measures to prevent the intercept <strong>of</strong> intentional<br />

electromagnetic transmissions. The objective is to minimize an<br />

adversary’s capability <strong>of</strong> receiving, processing, or replaying an<br />

electronic signal.<br />

SOURCE: CNSSI-4009<br />

Macro Virus – A virus that attaches itself to documents and uses the macro<br />

programming capabilities <strong>of</strong> the document’s application to execute<br />

and propagate.<br />

SOURCE: SP 800-61; CNSSI-4009<br />

Magnetic Remanence – Magnetic representation <strong>of</strong> residual information remaining on a<br />

magnetic medium after the medium has been cleared. See clearing.<br />

SOURCE: CNSSI-4009<br />

Maintenance Hook – Special instructions (trapdoors) in s<strong>of</strong>tware allowing easy<br />

maintenance and additional feature development. Since maintenance<br />

hooks frequently allow entry into the code without the usual checks,<br />

they are a serious security risk if they are not removed prior to live<br />

implementation.<br />

SOURCE: CNSSI-4009<br />

Maintenance <strong>Key</strong> – <strong>Key</strong> intended only for in-shop use.<br />

SOURCE: CNSSI-4009<br />

Major Application –<br />

An application that requires special attention to security due to the<br />

risk and magnitude <strong>of</strong> harm resulting from the loss, misuse, or<br />

unauthorized access to or modification <strong>of</strong> the information in the<br />

application. Note: All federal applications require some level <strong>of</strong><br />

protection. Certain applications, because <strong>of</strong> the information in them,<br />

however, require special management oversight and should be treated<br />

as major. Adequate security for other applications should be<br />

provided by security <strong>of</strong> the systems in which they operate.<br />

SOURCE: OMB Circular A-130, App. III<br />

Pg 114

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!