23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

All books, papers, maps, photographs, machine-readable materials, or<br />

other documentary materials, regardless <strong>of</strong> physical form or<br />

characteristics, made or received by an agency <strong>of</strong> the United States<br />

government under federal law or in connection with the transaction<br />

<strong>of</strong> public business and preserved or appropriate for preservation by<br />

that agency or its legitimate successor as evidence <strong>of</strong> the<br />

organization, functions, policies, decisions, procedures, operations, or<br />

other activities <strong>of</strong> the government or because <strong>of</strong> the informational<br />

value <strong>of</strong> the data in them. [44 U.S.C. SEC. 3301]<br />

SOURCE: FIPS 200<br />

Records Management – The process for tagging information for records-keeping<br />

requirements as mandated in the Federal Records Act and the<br />

National Archival and Records Requirements.<br />

SOURCE: CNSSI-4009<br />

Recovery Point Objective – The point in time to which data must be recovered after an outage.<br />

SOURCE: SP 800-34<br />

Recovery Time Objective – The overall length <strong>of</strong> time an information system’s components can<br />

be in the recovery phase before negatively impacting the<br />

organization’s mission or mission/business functions.<br />

SOURCE: SP 800-34<br />

Recovery Procedures – Actions necessary to restore data files <strong>of</strong> an information system and<br />

computational capability after a system failure.<br />

SOURCE: CNSSI-4009<br />

RED – In cryptographic systems, refers to information or messages that<br />

contain sensitive or classified information that is not encrypted. See<br />

also BLACK.<br />

SOURCE: CNSSI-4009<br />

Red Signal – Any electronic emission (e.g., plain text, key, key stream, subkey<br />

stream, initial fill, or control signal) that would divulge national<br />

security information if recovered.<br />

SOURCE: CNSSI-4009<br />

Red Team – A group <strong>of</strong> people authorized and organized to emulate a potential<br />

adversary’s attack or exploitation capabilities against an enterprise’s<br />

security posture. The Red Team’s objective is to improve enterprise<br />

<strong>Information</strong> Assurance by demonstrating the impacts <strong>of</strong> successful<br />

attacks and by demonstrating what works for the defenders (i.e., the<br />

Blue Team) in an operational environment.<br />

SOURCE: CNSSI-4009<br />

Pg 152

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!