23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Mechanisms – An assessment object that includes specific protection-related items<br />

(e.g., hardware, s<strong>of</strong>tware, or firmware) employed within or at the<br />

boundary <strong>of</strong> an information system.<br />

SOURCE: SP 800-53A<br />

Media – Physical devices or writing surfaces including but not limited to<br />

magnetic tapes, optical disks, magnetic disks, Large Scale Integration<br />

(LSI) memory chips, and printouts (but not including display media)<br />

onto which information is recorded, stored, or printed within an<br />

information system.<br />

SOURCE: FIPS 200; SP 800-53; CNSSI-4009<br />

Media Sanitization – A general term referring to the actions taken to render data written on<br />

media unrecoverable by both ordinary and extraordinary means.<br />

SOURCE: SP 800-88<br />

Memorandum <strong>of</strong><br />

Understanding/Agreement –<br />

(MOU/A)<br />

The actions taken to render data written on media unrecoverable by<br />

both ordinary and extraordinary means.<br />

SOURCE: CNSSI-4009<br />

A document established between two or more parties to define their<br />

respective responsibilities in accomplishing a particular goal or<br />

mission. In this guide, an MOU/A defines the responsibilities <strong>of</strong> two<br />

or more organizations in establishing, operating, and securing a<br />

system interconnection.<br />

SOURCE: SP 800-47<br />

A document established between two or more parties to define their<br />

respective responsibilities in accomplishing a particular goal or<br />

mission, e.g., establishing, operating, and securing a system<br />

interconnection.<br />

SOURCE: CNSSI-4009<br />

Memory Scavenging – The collection <strong>of</strong> residual information from data storage.<br />

SOURCE: CNSSI-4009<br />

Message Authentication Code –<br />

(MAC)<br />

Message Authentication Code –<br />

(MAC)<br />

A cryptographic checksum on data that uses a symmetric key to<br />

detect both accidental and intentional modifications <strong>of</strong> the data.<br />

SOURCE: SP 800-63; FIPS 201<br />

A cryptographic checksum that results from passing data through a<br />

message authentication algorithm.<br />

SOURCE: FIPS 198<br />

Pg 118

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!