23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Mobile Code Technologies – S<strong>of</strong>tware technologies that provide the mechanisms for the<br />

production and use <strong>of</strong> mobile code (e.g., Java, JavaScript, ActiveX,<br />

VBScript).<br />

SOURCE: SP 800-53; SP 800-18<br />

Mobile Device – Portable cartridge/disk-based, removable storage media (e.g., floppy<br />

disks, compact disks, USB flash drives, external hard drives, and<br />

other flash memory cards/drives that contain nonvolatile memory).<br />

Portable computing and communications device with information<br />

storage capability (e.g., notebook/laptop computers, personal<br />

digital assistants, cellular telephones, digital cameras, and audio<br />

recording devices).<br />

SOURCE: SP 800-53<br />

Mobile S<strong>of</strong>tware Agent – Programs that are goal-directed and capable <strong>of</strong> suspending their<br />

execution on one platform and moving to another platform where<br />

they resume execution.<br />

SOURCE: SP 800-19<br />

Mode <strong>of</strong> Operation – An algorithm for the cryptographic transformation <strong>of</strong> data that<br />

features a symmetric key block cipher algorithm.<br />

SOURCE: SP 800-38C<br />

Description <strong>of</strong> the conditions under which an information system<br />

operates based on the sensitivity <strong>of</strong> information processed and the<br />

clearance levels, formal access approvals, and need-to-know <strong>of</strong> its<br />

users. Four modes <strong>of</strong> operation are authorized for processing or<br />

transmitting information: dedicated mode, system high mode,<br />

compartmented/partitioned mode, and multilevel mode.<br />

SOURCE: CNSSI-4009<br />

Moderate Impact – The loss <strong>of</strong> confidentiality, integrity, or availability that could be<br />

expected to have a serious adverse effect on organizational<br />

operations, organizational assets, individuals, other organizations, or<br />

the national security interests <strong>of</strong> the United States; (i.e., 1) causes a<br />

significant degradation in mission capability to an extent and duration<br />

that the organization is able to perform its primary functions, but the<br />

effectiveness <strong>of</strong> the functions is significantly reduced; 2) results in<br />

significant damage to organizational assets; 3) results in significant<br />

financial loss; or 4) results in significant harm to individuals that does<br />

not involve loss <strong>of</strong> life or serious life threatening injuries).<br />

SOURCE: CNSSI-4009<br />

Pg 121

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!