23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Minor Application – An application, other than a major application, that requires attention<br />

to security due to the risk and magnitude <strong>of</strong> harm resulting from the<br />

loss, misuse, or unauthorized access to or modification <strong>of</strong> the<br />

information in the application. Minor applications are typically<br />

included as part <strong>of</strong> a general support system.<br />

SOURCE: SP 800-18<br />

Misnamed Files – A technique used to disguise a file’s content by changing the file’s<br />

name to something innocuous or altering its extension to a different<br />

type <strong>of</strong> file, forcing the examiner to identify the files by file signature<br />

versus file extension.<br />

SOURCE: SP 800-72; CNSSI-4009<br />

Mission Assurance Category –<br />

(MAC)<br />

A Department <strong>of</strong> Defense <strong>Information</strong> Assurance Certification and<br />

Accreditation Process (DIACAP) term primarily used to determine<br />

the requirements for availability and integrity.<br />

SOURCE: CNSSI-4009<br />

Mission Critical – Any telecommunications or information system that is defined as a<br />

national security system (Federal <strong>Information</strong> <strong>Security</strong> Management<br />

Act <strong>of</strong> 2002 - FISMA) or processes any information the loss, misuse,<br />

disclosure, or unauthorized access to or modification <strong>of</strong>, would have<br />

a debilitating impact on the mission <strong>of</strong> an agency.<br />

SOURCE: SP 800-60<br />

Mobile Code – S<strong>of</strong>tware programs or parts <strong>of</strong> programs obtained from remote<br />

information systems, transmitted across a network, and executed on a<br />

local information system without explicit installation or execution by<br />

the recipient.<br />

SOURCE: SP 800-53; SP 800-18<br />

A program (e.g., script, macro, or other portable instruction) that can<br />

be shipped unchanged to a heterogeneous collection <strong>of</strong> platforms and<br />

executed with identical semantics.<br />

SOURCE: SP 800-28<br />

S<strong>of</strong>tware programs or parts <strong>of</strong> programs obtained from remote<br />

information systems, transmitted across a network, and executed on a<br />

local information system without explicit installation or execution by<br />

the recipient.<br />

Note: Some examples <strong>of</strong> s<strong>of</strong>tware technologies that provide the<br />

mechanisms for the production and use <strong>of</strong> mobile code include Java,<br />

JavaScript, ActiveX, VBScript, etc.<br />

SOURCE: CNSSI-4009<br />

Pg 120

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!