23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Passive Attack – An attack against an authentication protocol where the attacker<br />

intercepts data traveling along the network between the claimant and<br />

verifier, but does not alter the data (i.e., eavesdropping).<br />

SOURCE: SP 800-63<br />

An attack that does not alter systems or data.<br />

SOURCE: CNSSI-4009<br />

Passive <strong>Security</strong> Testing – <strong>Security</strong> testing that does not involve any direct interaction with the<br />

targets, such as sending packets to a target.<br />

SOURCE: SP 800-115<br />

Passive Wiretapping – The monitoring or recording <strong>of</strong> data while it is being transmitted over<br />

a communications link, without altering or affecting the data.<br />

SOURCE: CNSSI-4009<br />

Password – A secret that a claimant memorizes and uses to authenticate his or her<br />

identity. Passwords are typically character strings.<br />

SOURCE: SP 800-63<br />

Password – A protected character string used to authenticate the identity <strong>of</strong> a<br />

computer system user or to authorize access to system resources.<br />

SOURCE: FIPS 181<br />

Password – A string <strong>of</strong> characters (letters, numbers, and other symbols) used to<br />

authenticate an identity or to verify access authorization.<br />

SOURCE: FIPS 140-2<br />

A protected/private string <strong>of</strong> letters, numbers, and/or special<br />

characters used to authenticate an identity or to authorize access to<br />

data.<br />

SOURCE: CNSSI-4009<br />

Password Cracking – The process <strong>of</strong> recovering secret passwords stored in a computer<br />

system or transmitted over a network.<br />

SOURCE: SP 800-115<br />

Password Protected – The ability to protect a file using a password access control,<br />

protecting the data contents from being viewed with the appropriate<br />

viewer unless the proper password is entered.<br />

SOURCE: SP 800-72<br />

The ability to protect the contents <strong>of</strong> a file or device from being<br />

accessed until the correct password is entered.<br />

SOURCE: SP 800-124<br />

Pg 134

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!