23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Repair Action – NSA-approved change to a COMSEC end-item that does not affect<br />

the original characteristics <strong>of</strong> the end-item and is provided for<br />

optional application by holders. Repair actions are limited to minor<br />

electrical and/or mechanical improvements to enhance operation,<br />

maintenance, or reliability. They do not require an identification<br />

label, marking, or control but must be fully documented by changes<br />

to the maintenance manual.<br />

SOURCE: CNSSI-4009<br />

Replay Attacks – An attack that involves the capture <strong>of</strong> transmitted authentication or<br />

access control information and its subsequent retransmission with the<br />

intent <strong>of</strong> producing an unauthorized effect or gaining unauthorized<br />

access.<br />

SOURCE: CNSSI-4009<br />

Repository – A database containing information and data relating to certificates as<br />

specified in a CP; may also be referred to as a directory.<br />

SOURCE: SP 800-32<br />

Reserve <strong>Key</strong>ing Material – <strong>Key</strong> held to satisfy unplanned needs. See contingency key.<br />

SOURCE: CNSSI-4009<br />

Residual Risk – The remaining potential risk after all IT security measures are<br />

applied. There is a residual risk associated with each threat.<br />

SOURCE: SP 800-33<br />

Portion <strong>of</strong> risk remaining after security measures have been applied.<br />

SOURCE: CNSSI-4009<br />

Residue – Data left in storage after information-processing operations are<br />

complete, but before degaussing or overwriting has taken place.<br />

SOURCE: CNSSI-4009<br />

Resilience – The ability to quickly adapt and recover from any known or unknown<br />

changes to the environment through holistic implementation <strong>of</strong> risk<br />

management, contingency, and continuity planning.<br />

SOURCE: SP 800-34<br />

Resource Encapsulation – Method by which the reference monitor mediates accesses to an<br />

information system resource. Resource is protected and not directly<br />

accessible by a subject. Satisfies requirement for accurate auditing <strong>of</strong><br />

resource usage.<br />

SOURCE: CNSSI-4009<br />

Pg 156

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!