23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Proxy Agent – A s<strong>of</strong>tware application running on a firewall or on a dedicated proxy<br />

server that is capable <strong>of</strong> filtering a protocol and routing it between the<br />

interfaces <strong>of</strong> the device.<br />

SOURCE: CNSSI-4009<br />

Proxy Server – A server that services the requests <strong>of</strong> its clients by forwarding those<br />

requests to other servers.<br />

SOURCE: CNSSI-4009<br />

Pseudorandom number generator –<br />

(PRNG)<br />

An algorithm that produces a sequence <strong>of</strong> bits that are uniquely<br />

determined from an initial value called a seed. The output <strong>of</strong> the<br />

PRNG “appears” to be random, i.e., the output is statistically<br />

indistinguishable from random values. A cryptographic PRNG has<br />

the additional property that the output is unpredictable, given that the<br />

seed is not known.<br />

SOURCE: SP 800-57; CNSSI-4009<br />

Pseudonym – A subscriber name that has been chosen by the subscriber that is not<br />

verified as meaningful by identity pro<strong>of</strong>ing.<br />

SOURCE: SP 800-63<br />

1. A subscriber name that has been chosen by the subscriber that is<br />

not verified as meaningful by identity pro<strong>of</strong>ing.<br />

2. An assigned identity that is used to protect an individual’s true<br />

identity.<br />

SOURCE: CNSSI-4009<br />

Public Domain S<strong>of</strong>tware – S<strong>of</strong>tware not protected by copyright laws <strong>of</strong> any nation that may be<br />

freely used without permission <strong>of</strong>, or payment to, the creator, and that<br />

carries no warranties from, or liabilities to the creator.<br />

SOURCE: CNSSI-4009<br />

Public <strong>Key</strong> – The public part <strong>of</strong> an asymmetric key pair that is typically used to<br />

verify signatures or encrypt data.<br />

SOURCE: FIPS 201; SP 800-63<br />

Pg 147

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!