23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Major <strong>Information</strong> System –<br />

An information system that requires special management attention<br />

because <strong>of</strong> its importance to an agency mission; its high<br />

development, operating, or maintenance costs; or its significant role<br />

in the administration <strong>of</strong> agency programs, finances, property, or other<br />

resources.<br />

SOURCE: OMB Circular A-130, App. III<br />

Malicious Applets – Small application programs that are automatically downloaded and<br />

executed and that perform an unauthorized function on an<br />

information system.<br />

SOURCE: CNSSI-4009<br />

Malicious Code – S<strong>of</strong>tware or firmware intended to perform an unauthorized process<br />

that will have adverse impact on the confidentiality, integrity, or<br />

availability <strong>of</strong> an information system. A virus, worm, Trojan horse,<br />

or other code-based entity that infects a host. Spyware and some<br />

forms <strong>of</strong> adware are also examples <strong>of</strong> malicious code.<br />

SOURCE: SP 800-53; CNSSI-4009<br />

A virus, worm, Trojan horse, or other code-based malicious entity<br />

that successfully infects a host.<br />

SOURCE: SP 800-61<br />

Malicious Logic – Hardware, firmware, or s<strong>of</strong>tware that is intentionally included or<br />

inserted in a system for a harmful purpose.<br />

SOURCE: CNSSI-4009<br />

Malware – A program that is inserted into a system, usually covertly, with the<br />

intent <strong>of</strong> compromising the confidentiality, integrity, or availability<br />

<strong>of</strong> the victim’s data, applications, or operating system or <strong>of</strong> otherwise<br />

annoying or disrupting the victim.<br />

SOURCE: SP 800-83<br />

Man-in-the-middle Attack –<br />

(MitM)<br />

See malicious code. See also malicious applets and malicious logic.<br />

SOURCE: SP 800-53; CNSSI-4009<br />

An attack on the authentication protocol run in which the attacker<br />

positions himself in between the claimant and verifier so that he can<br />

intercept and alter data traveling between them.<br />

SOURCE: SP 800-63<br />

A form <strong>of</strong> active wiretapping attack in which the attacker intercepts<br />

and selectively modifies communicated data to masquerade as one or<br />

more <strong>of</strong> the entities involved in a communication association.<br />

SOURCE: CNSSI-4009<br />

Pg 115

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!