23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Per-Call <strong>Key</strong> – Unique traffic encryption key generated automatically by certain<br />

secure telecommunications systems to secure single voice or data<br />

transmissions. See cooperative key generation.<br />

SOURCE: CNSSI-4009<br />

Performance Reference Model –<br />

(PRM)<br />

Framework for performance measurement providing common output<br />

measurements throughout the federal government. It allows agencies<br />

to better manage the business <strong>of</strong> government at a strategic level by<br />

providing a means for using an agency’s EA to measure the success<br />

<strong>of</strong> information systems investments and their impact on strategic<br />

outcomes.<br />

SOURCE: CNSSI-4009<br />

Perimeter – (C&A) Encompasses all those components <strong>of</strong> the system that are to<br />

be accredited by the DAA, and excludes separately accredited<br />

systems to which the system is connected.<br />

(Authorization) Encompasses all those components <strong>of</strong> the system or<br />

network for which a Body <strong>of</strong> Evidence is provided in support <strong>of</strong> a<br />

formal approval to operate.<br />

SOURCE: CNSSI-4009<br />

Periods Processing – The processing <strong>of</strong> various levels <strong>of</strong> classified and unclassified<br />

information at distinctly different times. Under the concept <strong>of</strong><br />

periods processing, the system must be purged <strong>of</strong> all information<br />

from one processing period before transitioning to the next.<br />

SOURCE: CNSSI-4009<br />

Perishable Data – <strong>Information</strong> whose value can decrease substantially during a<br />

specified time. A significant decrease in value occurs when the<br />

operational circumstances change to the extent that the information is<br />

no longer useful.<br />

SOURCE: CNSSI-4009<br />

Permuter – Device used in cryptographic equipment to change the order in which<br />

the contents <strong>of</strong> a shift register are used in various nonlinear<br />

combining circuits.<br />

SOURCE: CNSSI-4009<br />

Personal Firewall – A utility on a computer that monitors network activity and blocks<br />

communications that are unauthorized.<br />

SOURCE: SP 800-69<br />

Personal Identification Number –<br />

(PIN)<br />

A password consisting only <strong>of</strong> decimal digits.<br />

SOURCE: SP 800-63<br />

Pg 136

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!