23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Pro<strong>of</strong> <strong>of</strong> Possession Protocol –<br />

(PoP Protocol)<br />

A protocol where a claimant proves to a verifier that he/she possesses<br />

and controls a token (e.g., a key or password).<br />

SOURCE: SP 800-63<br />

Proprietary <strong>Information</strong> (PROPIN) – Material and information relating to or associated with a company's<br />

products, business, or activities, including but not limited to financial<br />

information; data or statements; trade secrets; product research and<br />

development; existing and future product designs and performance<br />

specifications; marketing plans or techniques; schematics; client lists;<br />

computer programs; processes; and know-how that has been clearly<br />

identified and properly marked by the company as proprietary<br />

information, trade secrets, or company confidential information. The<br />

information must have been developed by the company and not be<br />

available to the government or to the public without restriction from<br />

another source.<br />

SOURCE: CNSSI-4009<br />

Protected Distribution System<br />

(PDS) –<br />

Wire line or fiber optic system that includes adequate safeguards<br />

and/or countermeasures (e.g., acoustic, electric, electromagnetic, and<br />

physical) to permit its use for the transmission <strong>of</strong> unencrypted<br />

information through an area <strong>of</strong> lesser classification or control.<br />

SOURCE: CNSSI-4009<br />

Protection Philosophy – Informal description <strong>of</strong> the overall design <strong>of</strong> an information system<br />

delineating each <strong>of</strong> the protection mechanisms employed.<br />

Combination <strong>of</strong> formal and informal techniques, appropriate to the<br />

evaluation class, used to show the mechanisms are adequate to<br />

enforce the security policy.<br />

SOURCE: CNSSI-4009<br />

Protection Pr<strong>of</strong>ile – Common Criteria specification that represents an implementationindependent<br />

set <strong>of</strong> security requirements for a category <strong>of</strong> Target <strong>of</strong><br />

Evaluations (TOE) that meets specific consumer needs.<br />

SOURCE: CNSSI-4009<br />

Protective Distribution System – Wire line or fiber optic system that includes adequate safeguards<br />

and/or countermeasures (e.g., acoustic, electric, electromagnetic, and<br />

physical) to permit its use for the transmission <strong>of</strong> unencrypted<br />

information.<br />

SOURCE: SP 800-53<br />

Protective Packaging – Packaging techniques for COMSEC material that discourage<br />

penetration, reveal a penetration has occurred or was attempted, or<br />

inhibit viewing or copying <strong>of</strong> keying material prior to the time it is<br />

exposed for use.<br />

SOURCE: CNSSI-4009<br />

Pg 145

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!