23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Manipulative Communications<br />

Deception –<br />

Alteration or simulation <strong>of</strong> friendly telecommunications for the<br />

purpose <strong>of</strong> deception. See communications deception and imitative<br />

communications deception.<br />

SOURCE: CNSSI-4009<br />

Manual Cryptosystem – Cryptosystem in which the cryptographic processes are performed<br />

without the use <strong>of</strong> crypto-equipment or auto-manual devices.<br />

SOURCE: CNSSI-4009<br />

Manual <strong>Key</strong> Transport – A nonelectronic means <strong>of</strong> transporting cryptographic keys by<br />

physically moving a device, document, or person containing or<br />

possessing the key or a key component.<br />

SOURCE: SP 800-57<br />

Manual <strong>Key</strong> Transport – A nonelectronic means <strong>of</strong> transporting cryptographic keys.<br />

SOURCE: FIPS 140-2<br />

Manual Remote Rekeying – Procedure by which a distant crypto-equipment is rekeyed<br />

electronically, with specific actions required by the receiving<br />

terminal operator. Synonymous with cooperative remote rekeying.<br />

See also automatic remote keying.<br />

SOURCE: CNSSI-4009<br />

Marking – See <strong>Security</strong> Marking.<br />

Masquerading – When an unauthorized agent claims the identity <strong>of</strong> another agent, it is<br />

said to be masquerading.<br />

SOURCE: SP 800-19<br />

A type <strong>of</strong> threat action whereby an unauthorized entity gains access<br />

to a system or performs a malicious act by illegitimately posing as an<br />

authorized entity.<br />

SOURCE: CNSSI-4009<br />

Master Cryptographic Ignition <strong>Key</strong> – <strong>Key</strong> device with electronic logic and circuits providing the capability<br />

for adding more operational CIKs to a keyset.<br />

SOURCE: CNSSI-4009<br />

Match/matching – The process <strong>of</strong> comparing biometric information against a previously<br />

stored template(s) and scoring the level <strong>of</strong> similarity.<br />

SOURCE: FIPS 201; CNSSI-4009<br />

Maximum Tolerable Downtime – The amount <strong>of</strong> time mission/business processes can be disrupted<br />

without causing significant harm to the organization’s mission.<br />

SOURCE: SP 800-34<br />

Pg 117

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!