23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Operations <strong>Security</strong> (OPSEC) – Systematic and proven process by which potential adversaries can be<br />

denied information about capabilities and intentions by identifying,<br />

controlling, and protecting generally unclassified evidence <strong>of</strong> the<br />

planning and execution <strong>of</strong> sensitive activities. The process involves<br />

five steps: identification <strong>of</strong> critical information, analysis <strong>of</strong> threats,<br />

analysis <strong>of</strong> vulnerabilities, assessment <strong>of</strong> risks, and application <strong>of</strong><br />

appropriate countermeasures.<br />

SOURCE: CNSSI-4009<br />

Optional Modification – NSA-approved modification not required for universal<br />

implementation by all holders <strong>of</strong> a COMSEC end-item. This class <strong>of</strong><br />

modification requires all <strong>of</strong> the engineering/doctrinal control <strong>of</strong><br />

mandatory modification but is usually not related to security, safety,<br />

TEMPEST, or reliability. See mandatory modification.<br />

SOURCE: CNSSI-4009<br />

Organization – A federal agency, or, as appropriate, any <strong>of</strong> its operational elements.<br />

SOURCE: FIPS 200<br />

An entity <strong>of</strong> any size, complexity, or positioning within an<br />

organizational structure (e.g., a federal agency, or, as appropriate, any<br />

<strong>of</strong> its operational elements).<br />

SOURCE: SP 800-53; SP 800-53A; SP 800-37<br />

Organizational Maintenance – Limited maintenance performed by a user organization.<br />

SOURCE: CNSSI-4009<br />

Organizational Registration<br />

Authority (ORA) –<br />

Entity within the PKI that authenticates the identity and the<br />

organizational affiliation <strong>of</strong> the users.<br />

SOURCE: CNSSI-4009<br />

Organizational User – An organizational employee or an individual the organization deems<br />

to have equivalent status <strong>of</strong> an employee (e.g., contractor, guest<br />

researcher, individual detailed from another organization, individual<br />

from allied nation).<br />

SOURCE: SP 800-53<br />

Outside Threat – An unauthorized entity from outside the domain perimeter that has<br />

the potential to harm an <strong>Information</strong> System through destruction,<br />

disclosure, modification <strong>of</strong> data, and/or denial <strong>of</strong> service.<br />

SOURCE: SP 800-32<br />

Outside(r) Threat – An unauthorized entity outside the security domain that has the<br />

potential to harm an information system through destruction,<br />

disclosure, modification <strong>of</strong> data, and/or denial <strong>of</strong> service.<br />

SOURCE: CNSSI-4009<br />

Pg 132

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!