23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

National Vulnerability Database –<br />

(NVD)<br />

Any information system (including any telecommunications system)<br />

used or operated by an agency or by a contractor <strong>of</strong> any agency, or<br />

other organization on behalf <strong>of</strong> an agency, the function, operation, or<br />

use <strong>of</strong> which: I. involves intelligence activities; II. involves<br />

cryptologic activities related to national security; III. Involves<br />

command and control <strong>of</strong> military forces; IV. involves equipment that<br />

is an integral part <strong>of</strong> a weapon or weapon system; or V. subject to<br />

subparagraph (B), is critical to the direct fulfillment <strong>of</strong> military or<br />

intelligence missions; or is protected at all times by procedures<br />

established for information that have been specifically authorized<br />

under criteria established by an Executive Order or an Act <strong>of</strong><br />

Congress to be kept classified in the interest <strong>of</strong> national defense or<br />

foreign policy.<br />

Subparagraph (B). Does not include a system that is to be used for<br />

routine administrative and business applications (including payroll,<br />

finance, logistics, and personnel management applications). (Title 44<br />

U.S. Code Section 3542, Federal <strong>Information</strong> <strong>Security</strong> Management<br />

Act <strong>of</strong> 2002.)<br />

SOURCE: CNSSI-4009<br />

The U.S. government repository <strong>of</strong> standards-based vulnerability<br />

management data. This data enables automation <strong>of</strong> vulnerability<br />

management, security measurement, and compliance (e.g., FISMA).<br />

SOURCE: http://nvd.nist.gov/<br />

Need To Know Determination – Decision made by an authorized holder <strong>of</strong> <strong>of</strong>ficial information that a<br />

prospective recipient requires access to specific <strong>of</strong>ficial information<br />

to carry out <strong>of</strong>ficial duties.<br />

SOURCE: CNSSI-4009<br />

Need-To-Know – A method <strong>of</strong> isolating information resources based on a user’s need<br />

to have access to that resource in order to perform their job but no<br />

more. The terms ‘need-to know” and “least privilege” express the<br />

same idea. Need-to-know is generally applied to people, while least<br />

privilege is generally applied to processes.<br />

SOURCE: CNSSI-4009<br />

Needs Assessment (IT <strong>Security</strong><br />

Awareness and Training) –<br />

A process that can be used to determine an organization’s awareness<br />

and training needs. The results <strong>of</strong> a needs assessment can provide<br />

justification to convince management to allocate adequate resources<br />

to meet the identified awareness and training needs.<br />

SOURCE: SP 800-50<br />

Pg 125

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!