23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

An information system account with authorizations <strong>of</strong> a privileged<br />

user.<br />

SOURCE: SP 800-53<br />

Privileged Accounts – Individuals who have access to set “access rights” for users on a<br />

given system. Sometimes referred to as system or network<br />

administrative accounts.<br />

SOURCE: SP 800-12<br />

Privileged Command – A human-initiated command executed on an information system<br />

involving the control, monitoring, or administration <strong>of</strong> the system<br />

including security functions and associated security-relevant<br />

information.<br />

SOURCE: SP 800-53; CNSSI-4009<br />

Privileged Process – A computer process that is authorized (and, therefore, trusted) to<br />

perform security-relevant functions that ordinary processes are not<br />

authorized to perform.<br />

SOURCE: CNSSI-4009<br />

Privileged User – A user that is authorized (and, therefore, trusted) to perform securityrelevant<br />

functions that ordinary users are not authorized to perform.<br />

SOURCE: SP 800-53; CNSSI-4009<br />

Probability <strong>of</strong> Occurrence – See Likelihood <strong>of</strong> Occurrence.<br />

Probe – A technique that attempts to access a system to learn something about<br />

the system.<br />

SOURCE: CNSSI-4009<br />

Product Source Node (PSN) – The <strong>Key</strong> Management Infrastructure core node that provides central<br />

generation <strong>of</strong> cryptographic key material.<br />

SOURCE: CNSSI-4009<br />

Production Model – INFOSEC equipment in its final mechanical and electrical form.<br />

SOURCE: CNSSI-4009<br />

Pr<strong>of</strong>iling – Measuring the characteristics <strong>of</strong> expected activity so that changes to<br />

it can be more easily identified.<br />

SOURCE: SP 800-61; CNSSI-4009<br />

Promiscuous Mode – A configuration setting for a network interface card that causes it to<br />

accept all incoming packets that it sees, regardless <strong>of</strong> their intended<br />

destinations.<br />

SOURCE: SP 800-94<br />

Pg 144

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!