23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Risk Mitigation – Risk mitigation involves prioritizing, evaluating, and implementing<br />

the appropriate risk-reducing controls recommended from the risk<br />

assessment process.<br />

SOURCE: SP 800-30<br />

Prioritizing, evaluating, and implementing the appropriate riskreducing<br />

controls/countermeasures recommended from the risk<br />

management process.<br />

SOURCE: CNSSI-4009<br />

Risk Tolerance – The level <strong>of</strong> risk an entity is willing to assume in order to achieve a<br />

potential desired result.<br />

SOURCE: SP 800-32<br />

The defined impacts to an enterprise’s information systems that an<br />

entity is willing to accept.<br />

SOURCE: CNSSI-4009<br />

Robust <strong>Security</strong> Network (RSN) – A wireless security network that only allows the creation <strong>of</strong> Robust<br />

<strong>Security</strong> Network Associations (RSNAs).<br />

SOURCE: SP 800-48<br />

Robust <strong>Security</strong> Network<br />

Association (RSNA) –<br />

A logical connection between communicating IEEE 802.11 entities<br />

established through the IEEE 802.11i key management scheme, also<br />

known as the four-way handshake.<br />

SOURCE: SP 800-48<br />

Robustness – The ability <strong>of</strong> an <strong>Information</strong> Assurance entity to operate correctly<br />

and reliably across a wide range <strong>of</strong> operational conditions, and to fail<br />

gracefully outside <strong>of</strong> that operational range.<br />

SOURCE: CNSSI-4009<br />

Rogue Device – An unauthorized node on a network.<br />

SOURCE: SP 800-115<br />

Role – A group attribute that ties membership to function. When an entity<br />

assumes a role, the entity is given certain rights that belong to that<br />

role. When the entity leaves the role, those rights are removed. The<br />

rights given are consistent with the functionality that the entity needs<br />

to perform the expected tasks.<br />

SOURCE: CNSSI-4009<br />

Pg 161

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!