NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

csrc.nist.gov
from csrc.nist.gov More from this publisher
23.03.2013 Views

NIST IR 7298 Revision 1, Glossary of Key Information Security Terms Net-centric Architecture – A complex system of systems composed of subsystems and services that are part of a continuously evolving, complex community of people, devices, information and services interconnected by a network that enhances information sharing and collaboration. Subsystems and services may or may not be developed or owned by the same entity, and, in general, will not be continually present during the full life cycle of the system of systems. Examples of this architecture include service-oriented architectures and cloud computing architectures. SOURCE: SP 800-37 Network – Information system(s) implemented with a collection of interconnected components. Such components may include routers, hubs, cabling, telecommunications controllers, key distribution centers, and technical control devices. SOURCE: SP 800-53; CNSSI-4009 Network Access – Access to an organizational information system by a user (or a process acting on behalf of a user) communicating through a network (e.g., local area network, wide area network, Internet). SOURCE: SP 800-53; CNSSI-4009 Network Access Control (NAC) – A feature provided by some firewalls that allows access based on a user’s credentials and the results of health checks performed on the telework client device. SOURCE: SP 800-41 Network Address Translation (NAT) – A routing technology used by many firewalls to hide internal system addresses from an external network through use of an addressing schema. SOURCE: SP 800-41 Network Front-End – Device implementing protocols that allow attachment of a computer system to a network. SOURCE: CNSSI-4009 Network Reference Monitor – See Reference Monitor. Network Resilience – A computing infrastructure that provides continuous business operation (i.e., highly resistant to disruption and able to operate in a degraded mode if damaged), rapid recovery if failure does occur, and the ability to scale to meet rapid or unpredictable demands. SOURCE: CNSSI-4009 Network Security – See Information Assurance. Network Security Officer – See Information Systems Security Officer. Pg 126

NIST IR 7298 Revision 1, Glossary of Key Information Security Terms Network Sniffing – A passive technique that monitors network communication, decodes protocols, and examines headers and payloads for information of interest. It is both a review technique and a target identification and analysis technique. SOURCE: SP 800-115 Network Sponsor – Individual or organization responsible for stating the security policy enforced by the network, designing the network security architecture to properly enforce that policy, and ensuring that the network is implemented in such a way that the policy is enforced. SOURCE: CNSSI-4009 Network System – System implemented with a collection of interconnected components. A network system is based on a coherent security architecture and design. SOURCE: CNSSI-4009 Network Weaving – Penetration technique in which different communication networks are linked to access an information system to avoid detection and traceback. SOURCE: CNSSI-4009 No-Lone Zone (NLZ) – Non-Local Maintenance – Non-Organizational User – Non-repudiation – Area, room, or space that, when staffed, must be occupied by two or more appropriately cleared individuals who remain within sight of each other. See two-person integrity. SOURCE: CNSSI-4009 Maintenance activities conducted by individuals communicating through a network; either an external network (e.g., the Internet) or an internal network. SOURCE: SP 800-53 A user who is not an organizational user (including public users). SOURCE: SP 800-53 Assurance that the sender of information is provided with proof of delivery and the recipient is provided with proof of the sender’s identity, so neither can later deny having processed the information. SOURCE: CNSSI-4009; SP 800-60 Protection against an individual falsely denying having performed a particular action. Provides the capability to determine whether a given individual took a particular action such as creating information, sending a message, approving information, and receiving a message. SOURCE: SP 800-53; SP 800-18 Pg 127

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Net-centric Architecture – A complex system <strong>of</strong> systems composed <strong>of</strong> subsystems and<br />

services that are part <strong>of</strong> a continuously evolving, complex<br />

community <strong>of</strong> people, devices, information and services<br />

interconnected by a network that enhances information sharing<br />

and collaboration. Subsystems and services may or may not be<br />

developed or owned by the same entity, and, in general, will not<br />

be continually present during the full life cycle <strong>of</strong> the system <strong>of</strong><br />

systems. Examples <strong>of</strong> this architecture include service-oriented<br />

architectures and cloud computing architectures.<br />

SOURCE: SP 800-37<br />

Network – <strong>Information</strong> system(s) implemented with a collection <strong>of</strong><br />

interconnected components. Such components may include routers,<br />

hubs, cabling, telecommunications controllers, key distribution<br />

centers, and technical control devices.<br />

SOURCE: SP 800-53; CNSSI-4009<br />

Network Access – Access to an organizational information system by a user (or a<br />

process acting on behalf <strong>of</strong> a user) communicating through a network<br />

(e.g., local area network, wide area network, Internet).<br />

SOURCE: SP 800-53; CNSSI-4009<br />

Network Access Control (NAC) – A feature provided by some firewalls that allows access based on a<br />

user’s credentials and the results <strong>of</strong> health checks performed on the<br />

telework client device.<br />

SOURCE: SP 800-41<br />

Network Address Translation<br />

(NAT) –<br />

A routing technology used by many firewalls to hide internal system<br />

addresses from an external network through use <strong>of</strong> an addressing<br />

schema.<br />

SOURCE: SP 800-41<br />

Network Front-End – Device implementing protocols that allow attachment <strong>of</strong> a computer<br />

system to a network.<br />

SOURCE: CNSSI-4009<br />

Network Reference Monitor – See Reference Monitor.<br />

Network Resilience – A computing infrastructure that provides continuous business<br />

operation (i.e., highly resistant to disruption and able to operate in a<br />

degraded mode if damaged), rapid recovery if failure does occur, and<br />

the ability to scale to meet rapid or unpredictable demands.<br />

SOURCE: CNSSI-4009<br />

Network <strong>Security</strong> – See <strong>Information</strong> Assurance.<br />

Network <strong>Security</strong> Officer – See <strong>Information</strong> Systems <strong>Security</strong> Officer.<br />

Pg 126

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!