NISTIR 7298 Revision 1, Glossary of Key Information Security Terms
NISTIR 7298 Revision 1, Glossary of Key Information Security Terms NISTIR 7298 Revision 1, Glossary of Key Information Security Terms
NIST IR 7298 Revision 1, Glossary of Key Information Security Terms Net-centric Architecture – A complex system of systems composed of subsystems and services that are part of a continuously evolving, complex community of people, devices, information and services interconnected by a network that enhances information sharing and collaboration. Subsystems and services may or may not be developed or owned by the same entity, and, in general, will not be continually present during the full life cycle of the system of systems. Examples of this architecture include service-oriented architectures and cloud computing architectures. SOURCE: SP 800-37 Network – Information system(s) implemented with a collection of interconnected components. Such components may include routers, hubs, cabling, telecommunications controllers, key distribution centers, and technical control devices. SOURCE: SP 800-53; CNSSI-4009 Network Access – Access to an organizational information system by a user (or a process acting on behalf of a user) communicating through a network (e.g., local area network, wide area network, Internet). SOURCE: SP 800-53; CNSSI-4009 Network Access Control (NAC) – A feature provided by some firewalls that allows access based on a user’s credentials and the results of health checks performed on the telework client device. SOURCE: SP 800-41 Network Address Translation (NAT) – A routing technology used by many firewalls to hide internal system addresses from an external network through use of an addressing schema. SOURCE: SP 800-41 Network Front-End – Device implementing protocols that allow attachment of a computer system to a network. SOURCE: CNSSI-4009 Network Reference Monitor – See Reference Monitor. Network Resilience – A computing infrastructure that provides continuous business operation (i.e., highly resistant to disruption and able to operate in a degraded mode if damaged), rapid recovery if failure does occur, and the ability to scale to meet rapid or unpredictable demands. SOURCE: CNSSI-4009 Network Security – See Information Assurance. Network Security Officer – See Information Systems Security Officer. Pg 126
NIST IR 7298 Revision 1, Glossary of Key Information Security Terms Network Sniffing – A passive technique that monitors network communication, decodes protocols, and examines headers and payloads for information of interest. It is both a review technique and a target identification and analysis technique. SOURCE: SP 800-115 Network Sponsor – Individual or organization responsible for stating the security policy enforced by the network, designing the network security architecture to properly enforce that policy, and ensuring that the network is implemented in such a way that the policy is enforced. SOURCE: CNSSI-4009 Network System – System implemented with a collection of interconnected components. A network system is based on a coherent security architecture and design. SOURCE: CNSSI-4009 Network Weaving – Penetration technique in which different communication networks are linked to access an information system to avoid detection and traceback. SOURCE: CNSSI-4009 No-Lone Zone (NLZ) – Non-Local Maintenance – Non-Organizational User – Non-repudiation – Area, room, or space that, when staffed, must be occupied by two or more appropriately cleared individuals who remain within sight of each other. See two-person integrity. SOURCE: CNSSI-4009 Maintenance activities conducted by individuals communicating through a network; either an external network (e.g., the Internet) or an internal network. SOURCE: SP 800-53 A user who is not an organizational user (including public users). SOURCE: SP 800-53 Assurance that the sender of information is provided with proof of delivery and the recipient is provided with proof of the sender’s identity, so neither can later deny having processed the information. SOURCE: CNSSI-4009; SP 800-60 Protection against an individual falsely denying having performed a particular action. Provides the capability to determine whether a given individual took a particular action such as creating information, sending a message, approving information, and receiving a message. SOURCE: SP 800-53; SP 800-18 Pg 127
- Page 76 and 77: NIST IR 7298 Revision 1, Glossary o
- Page 78 and 79: NIST IR 7298 Revision 1, Glossary o
- Page 80 and 81: NIST IR 7298 Revision 1, Glossary o
- Page 82 and 83: NIST IR 7298 Revision 1, Glossary o
- Page 84 and 85: NIST IR 7298 Revision 1, Glossary o
- Page 86 and 87: NIST IR 7298 Revision 1, Glossary o
- Page 88 and 89: NIST IR 7298 Revision 1, Glossary o
- Page 90 and 91: NIST IR 7298 Revision 1, Glossary o
- Page 92 and 93: NIST IR 7298 Revision 1, Glossary o
- Page 94 and 95: NIST IR 7298 Revision 1, Glossary o
- Page 96 and 97: NIST IR 7298 Revision 1, Glossary o
- Page 98 and 99: NIST IR 7298 Revision 1, Glossary o
- Page 100 and 101: NIST IR 7298 Revision 1, Glossary o
- Page 102 and 103: NIST IR 7298 Revision 1, Glossary o
- Page 104 and 105: NIST IR 7298 Revision 1, Glossary o
- Page 106 and 107: NIST IR 7298 Revision 1, Glossary o
- Page 108 and 109: NIST IR 7298 Revision 1, Glossary o
- Page 110 and 111: NIST IR 7298 Revision 1, Glossary o
- Page 112 and 113: NIST IR 7298 Revision 1, Glossary o
- Page 114 and 115: NIST IR 7298 Revision 1, Glossary o
- Page 116 and 117: NIST IR 7298 Revision 1, Glossary o
- Page 118 and 119: NIST IR 7298 Revision 1, Glossary o
- Page 120 and 121: NIST IR 7298 Revision 1, Glossary o
- Page 122 and 123: NIST IR 7298 Revision 1, Glossary o
- Page 124 and 125: NIST IR 7298 Revision 1, Glossary o
- Page 128 and 129: NIST IR 7298 Revision 1, Glossary o
- Page 130 and 131: NIST IR 7298 Revision 1, Glossary o
- Page 132 and 133: NIST IR 7298 Revision 1, Glossary o
- Page 134 and 135: NIST IR 7298 Revision 1, Glossary o
- Page 136 and 137: NIST IR 7298 Revision 1, Glossary o
- Page 138 and 139: NIST IR 7298 Revision 1, Glossary o
- Page 140 and 141: NIST IR 7298 Revision 1, Glossary o
- Page 142 and 143: NIST IR 7298 Revision 1, Glossary o
- Page 144 and 145: NIST IR 7298 Revision 1, Glossary o
- Page 146 and 147: NIST IR 7298 Revision 1, Glossary o
- Page 148 and 149: NIST IR 7298 Revision 1, Glossary o
- Page 150 and 151: NIST IR 7298 Revision 1, Glossary o
- Page 152 and 153: NIST IR 7298 Revision 1, Glossary o
- Page 154 and 155: NIST IR 7298 Revision 1, Glossary o
- Page 156 and 157: NIST IR 7298 Revision 1, Glossary o
- Page 158 and 159: NIST IR 7298 Revision 1, Glossary o
- Page 160 and 161: NIST IR 7298 Revision 1, Glossary o
- Page 162 and 163: NIST IR 7298 Revision 1, Glossary o
- Page 164 and 165: NIST IR 7298 Revision 1, Glossary o
- Page 166 and 167: NIST IR 7298 Revision 1, Glossary o
- Page 168 and 169: NIST IR 7298 Revision 1, Glossary o
- Page 170 and 171: NIST IR 7298 Revision 1, Glossary o
- Page 172 and 173: NIST IR 7298 Revision 1, Glossary o
- Page 174 and 175: NIST IR 7298 Revision 1, Glossary o
NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />
Net-centric Architecture – A complex system <strong>of</strong> systems composed <strong>of</strong> subsystems and<br />
services that are part <strong>of</strong> a continuously evolving, complex<br />
community <strong>of</strong> people, devices, information and services<br />
interconnected by a network that enhances information sharing<br />
and collaboration. Subsystems and services may or may not be<br />
developed or owned by the same entity, and, in general, will not<br />
be continually present during the full life cycle <strong>of</strong> the system <strong>of</strong><br />
systems. Examples <strong>of</strong> this architecture include service-oriented<br />
architectures and cloud computing architectures.<br />
SOURCE: SP 800-37<br />
Network – <strong>Information</strong> system(s) implemented with a collection <strong>of</strong><br />
interconnected components. Such components may include routers,<br />
hubs, cabling, telecommunications controllers, key distribution<br />
centers, and technical control devices.<br />
SOURCE: SP 800-53; CNSSI-4009<br />
Network Access – Access to an organizational information system by a user (or a<br />
process acting on behalf <strong>of</strong> a user) communicating through a network<br />
(e.g., local area network, wide area network, Internet).<br />
SOURCE: SP 800-53; CNSSI-4009<br />
Network Access Control (NAC) – A feature provided by some firewalls that allows access based on a<br />
user’s credentials and the results <strong>of</strong> health checks performed on the<br />
telework client device.<br />
SOURCE: SP 800-41<br />
Network Address Translation<br />
(NAT) –<br />
A routing technology used by many firewalls to hide internal system<br />
addresses from an external network through use <strong>of</strong> an addressing<br />
schema.<br />
SOURCE: SP 800-41<br />
Network Front-End – Device implementing protocols that allow attachment <strong>of</strong> a computer<br />
system to a network.<br />
SOURCE: CNSSI-4009<br />
Network Reference Monitor – See Reference Monitor.<br />
Network Resilience – A computing infrastructure that provides continuous business<br />
operation (i.e., highly resistant to disruption and able to operate in a<br />
degraded mode if damaged), rapid recovery if failure does occur, and<br />
the ability to scale to meet rapid or unpredictable demands.<br />
SOURCE: CNSSI-4009<br />
Network <strong>Security</strong> – See <strong>Information</strong> Assurance.<br />
Network <strong>Security</strong> Officer – See <strong>Information</strong> Systems <strong>Security</strong> Officer.<br />
Pg 126