23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Physically Isolated Network – A network that is not connected to entities or systems outside a<br />

physically controlled space.<br />

SOURCE: SP 800-32<br />

PII Confidentiality Impact Level – The PII confidentiality impact level—low, moderate, or high—<br />

indicates the potential harm that could result to the subject<br />

individuals and/or the organization if PII were inappropriately<br />

accessed, used, or disclosed.<br />

SOURCE: SP 800-122<br />

Plaintext – Data input to the Cipher or output from the Inverse Cipher.<br />

SOURCE: FIPS 197<br />

Plaintext – Intelligible data that has meaning and can be understood without the<br />

application <strong>of</strong> decryption.<br />

SOURCE: SP 800-21<br />

Unencrypted information.<br />

SOURCE: CNSSI-4009<br />

Plaintext <strong>Key</strong> – An unencrypted cryptographic key.<br />

SOURCE: FIPS 140-2<br />

Plan <strong>of</strong> Action and Milestones –<br />

(POA&M)<br />

Policy Approving Authority –<br />

(PAA)<br />

Policy-Based Access Control –<br />

(PBAC)<br />

Policy Certification Authority –<br />

(PCA)<br />

A document that identifies tasks needing to be accomplished. It<br />

details resources required to accomplish the elements <strong>of</strong> the plan, any<br />

milestones in meeting the tasks, and scheduled completion dates for<br />

the milestones.<br />

SOURCE: SP 800-53; SP 800-53A; SP 800-37; SP 800-64; CNSSI-<br />

4009; OMB Memorandum 02-01<br />

First level <strong>of</strong> the PKI Certification Management Authority that<br />

approves the security policy <strong>of</strong> each PCA.<br />

SOURCE: CNSSI-4009<br />

A form <strong>of</strong> access control that uses an authorization policy that is<br />

flexible in the types <strong>of</strong> evaluated parameters (e.g., identity, role,<br />

clearance, operational need, risk, heuristics).<br />

SOURCE: CNSSI-4009<br />

Second level <strong>of</strong> the PKI Certification Management Authority that<br />

formulates the security policy under which it and its subordinate CAs<br />

will issue public key certificates.<br />

SOURCE: CNSSI-4009<br />

Pg 139

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!