23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Protective Technologies – Special tamper-evident features and materials employed for the<br />

purpose <strong>of</strong> detecting tampering and deterring attempts to<br />

compromise, modify, penetrate, extract, or substitute information<br />

processing equipment and keying material.<br />

SOURCE: CNSSI-4009<br />

Protocol – Set <strong>of</strong> rules and formats, semantic and syntactic, permitting<br />

information systems to exchange information.<br />

SOURCE: CNSSI-4009<br />

Protocol Data Unit – A unit <strong>of</strong> data specified in a protocol and consisting <strong>of</strong> protocol<br />

information and, possibly, user data.<br />

SOURCE: FIPS 188<br />

Protocol Entity – Entity that follows a set <strong>of</strong> rules and formats (semantic and syntactic)<br />

that determines the communication behavior <strong>of</strong> other entities.<br />

SOURCE: FIPS 188<br />

Protocol Run – An instance <strong>of</strong> the exchange <strong>of</strong> messages between a claimant and a<br />

verifier in a defined authentication protocol that results in the<br />

authentication (or authentication failure) <strong>of</strong> the claimant.<br />

SOURCE: SP 800-63<br />

Proxy – A proxy is an application that “breaks” the connection between client<br />

and server. The proxy accepts certain types <strong>of</strong> traffic entering or<br />

leaving a network and processes it and forwards it. This effectively<br />

closes the straight path between the internal and external networks<br />

making it more difficult for an attacker to obtain internal addresses<br />

and other details <strong>of</strong> the organization’s internal network. Proxy<br />

servers are available for common Internet services; for example, a<br />

Hyper Text Transfer Protocol (HTTP) proxy used for Web access,<br />

and a Simple Mail Transfer Protocol (SMTP) proxy used for email.<br />

SOURCE: SP 800-44<br />

An application that “breaks” the connection between client and<br />

server. The proxy accepts certain types <strong>of</strong> traffic entering or leaving<br />

a network and processes it and forwards it.<br />

Note: This effectively closes the straight path between the internal<br />

and external networks, making it more difficult for an attacker to<br />

obtain internal addresses and other details <strong>of</strong> the organization’s<br />

internal network. Proxy servers are available for common Internet<br />

services; for example, a Hyper Text Transfer Protocol (HTTP) proxy<br />

used for Web access, and a Simple Mail Transfer Protocol (SMTP)<br />

proxy used for email.<br />

SOURCE: CNSSI-4009<br />

Pg 146

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!