23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Open Storage – Any storage <strong>of</strong> classified national security information outside <strong>of</strong><br />

approved containers. This includes classified information that is<br />

resident on information systems media and outside <strong>of</strong> an approved<br />

storage container, regardless <strong>of</strong> whether or not that media is in use<br />

(i.e., unattended operations).<br />

SOURCE: CNSSI-4009<br />

Operating System (OS)<br />

Fingerprinting –<br />

Operational Controls –<br />

Operational <strong>Key</strong> –<br />

Operational Vulnerability<br />

<strong>Information</strong> –<br />

Analyzing characteristics <strong>of</strong> packets sent by a target, such as packet<br />

headers or listening ports, to identify the operating system in use on<br />

the target.<br />

SOURCE: SP 800-115<br />

The security controls (i.e., safeguards or countermeasures) for an<br />

information system that primarily are implemented and executed by<br />

people (as opposed to systems).<br />

SOURCE: SP 800-53; SP 800-37; FIPS 200<br />

The security controls (i.e., safeguards or countermeasures) for an<br />

information system that are primarily implemented and executed by<br />

people (as opposed to systems).<br />

SOURCE: CNSSI-4009; SP 800-53A<br />

<strong>Key</strong> intended for use over-the-air for protection <strong>of</strong> operational<br />

information or for the production or secure electrical transmission <strong>of</strong><br />

key streams.<br />

SOURCE: CNSSI-4009<br />

<strong>Information</strong> that describes the presence <strong>of</strong> an information<br />

vulnerability within a specific operational setting or network.<br />

SOURCE: CNSSI-4009<br />

Operational Waiver – Authority for continued use <strong>of</strong> unmodified COMSEC end-items<br />

pending the completion <strong>of</strong> a mandatory modification.<br />

SOURCE: CNSSI-4009<br />

Operations Code – Code composed largely <strong>of</strong> words and phrases suitable for general<br />

communications use.<br />

SOURCE: CNSSI-4009<br />

Pg 131

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!