23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Patch – An update to an operating system, application, or other s<strong>of</strong>tware<br />

issued specifically to correct particular problems with the s<strong>of</strong>tware.<br />

SOURCE: SP 800-123<br />

Patch Management – The systematic notification, identification, deployment, installation,<br />

and verification <strong>of</strong> operating system and application s<strong>of</strong>tware code<br />

revisions. These revisions are known as patches, hot fixes, and<br />

service packs.<br />

SOURCE: CNSSI-4009<br />

Path Histories – Maintaining an authenticatable record <strong>of</strong> the prior platforms visited<br />

by a mobile s<strong>of</strong>tware agent, so that a newly visited platform can<br />

determine whether to process the agent and what resource constraints<br />

to apply.<br />

SOURCE: SP 800-19<br />

Payload – The input data to the CCM generation-encryption process that is both<br />

authenticated and encrypted.<br />

SOURCE: SP 800-38C<br />

Peer Entity Authentication – The process <strong>of</strong> verifying that a peer entity in an association is as<br />

claimed.<br />

SOURCE: CNSSI-4009<br />

Penetration – See Intrusion.<br />

Penetration Testing – A test methodology in which assessors, using all available<br />

documentation (e.g., system design, source code, manuals) and<br />

working under specific constraints, attempt to circumvent the security<br />

features <strong>of</strong> an information system.<br />

SOURCE: SP 800-53A<br />

A test methodology in which assessors, typically working under<br />

specific constraints, attempt to circumvent or defeat the security<br />

features <strong>of</strong> an information system.<br />

SOURCE: SP 800-53; CNSSI-4009<br />

<strong>Security</strong> testing in which evaluators mimic real-world attacks in an<br />

attempt to identify ways to circumvent the security features <strong>of</strong> an<br />

application, system, or network. Penetration testing <strong>of</strong>ten involves<br />

issuing real attacks on real systems and data, using the same tools and<br />

techniques used by actual attackers. Most penetration tests involve<br />

looking for combinations <strong>of</strong> vulnerabilities on a single system or<br />

multiple systems that can be used to gain more access than could be<br />

achieved through a single vulnerability.<br />

SOURCE: SP 800-115<br />

Pg 135

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!