23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Randomizer – Analog or digital source <strong>of</strong> unpredictable, unbiased, and usually<br />

independent bits. Randomizers can be used for several different<br />

functions, including key generation or to provide a starting state for a<br />

key generator.<br />

SOURCE: CNSSI-4009<br />

RBAC – See Role-Based Access Control.<br />

Read – Fundamental operation in an information system that results only in<br />

the flow <strong>of</strong> information from an object to a subject.<br />

SOURCE: CNSSI-4009<br />

Read Access – Permission to read information in an information system.<br />

SOURCE: CNSSI-4009<br />

Real-Time Reaction – Immediate response to a penetration attempt that is detected and<br />

diagnosed in time to prevent access.<br />

SOURCE: CNSSI-4009<br />

Recipient Usage Period – The period <strong>of</strong> time during the cryptoperiod <strong>of</strong> a symmetric key when<br />

protected information is processed.<br />

SOURCE: SP 800-57<br />

Reciprocity – Mutual agreement among participating enterprises to accept each<br />

other’s security assessments in order to reuse information system<br />

resources and/or to accept each other’s assessed security posture in<br />

order to share information.<br />

SOURCE: CNSSI-4009<br />

Mutual agreement among participating organizations to accept<br />

each other’s security assessments in order to reuse information<br />

system resources and/or to accept each other’s assessed security<br />

posture in order to share information.<br />

SOURCE: SP 800-37; SP 800-53; SP 800-53A<br />

Records – The recordings (automated and/or manual) <strong>of</strong> evidence <strong>of</strong> activities<br />

performed or results achieved (e.g., forms, reports, test results),<br />

which serve as a basis for verifying that the organization and the<br />

information system are performing as intended. Also used to refer to<br />

units <strong>of</strong> related data fields (i.e., groups <strong>of</strong> data fields that can be<br />

accessed by a program and that contain the complete set <strong>of</strong><br />

information on particular items).<br />

SOURCE: SP 800-53; SP 800-53A; CNSSI-4009<br />

Pg 151

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!