NISTIR 7298 Revision 1, Glossary of Key Information Security Terms
NISTIR 7298 Revision 1, Glossary of Key Information Security Terms NISTIR 7298 Revision 1, Glossary of Key Information Security Terms
NIST IR 7298 Revision 1, Glossary of Key Information Security Terms Salt – A non-secret value that is used in a cryptographic process, usually to ensure that the results of computations for one instance cannot be reused by an attacker. SOURCE: SP 800-63; CNSSI-4009 Sandboxing – A method of isolating application modules into distinct fault domains enforced by software. The technique allows untrusted programs written in an unsafe language, such as C, to be executed safely within the single virtual address space of an application. Untrusted machine interpretable code modules are transformed so that all memory accesses are confined to code and data segments within their fault domain. Access to system resources can also be controlled through a unique identifier associated with each domain. SOURCE: SP 800-19 Sanitization – A restricted, controlled execution environment that prevents potentially malicious software, such as mobile code, from accessing any system resources except those for which the software is authorized. SOURCE: CNSSI-4009 Process to remove information from media such that information recovery is not possible. It includes removing all labels, markings, and activity logs. SOURCE: FIPS 200 A general term referring to the actions taken to render data written on media unrecoverable by both ordinary and, for some forms of sanitization, extraordinary means. SOURCE: SP 800-53; CNSSI-4009 SCADA – See Supervisory Control and Data Acquisition. Scanning – Sending packets or requests to another system to gain information to be used in a subsequent attack. SOURCE: SP 800-61; CNSSI-4009 Scavenging – Searching through object residue to acquire data. SOURCE: CNSSI-4009 Pg 164
NIST IR 7298 Revision 1, Glossary of Key Information Security Terms Scoping Guidance – A part of tailoring guidance providing organizations with specific policy/regulatory-related, technology-related, system component allocation-related, operational/environmental-related, physical infrastructure-related, public access-related, scalability-related, common control-related, and security objective-related considerations on the applicability and implementation of individual security controls in the security control baseline. SOURCE: SP 800-53 Scoping Guidance – Specific factors related to technology, infrastructure, public access, scalability, common security controls, and risk that can be considered by organizations in the applicability and implementation of individual security controls in the security control baseline. SOURCE: FIPS 200; CNSSI-4009 Secret Key – A cryptographic key that is used with a secret key (symmetric) cryptographic algorithm, that is uniquely associated with one or more entities and is not made public. The use of the term “secret” in this context does not imply a classification level, but rather implies the need to protect the key from disclosure. SOURCE: SP 800-57 A cryptographic key that is used with a symmetric cryptographic algorithm that is uniquely associated with one or more entities and is not made public. The use of the term “secret” in this context does not imply a classification level, but rather implies the need to protect the key from disclosure. SOURCE: CNSSI-4009 Secret Key – A cryptographic key that must be protected from unauthorized disclosure to protect data encrypted with the key. The use of the term “secret” in this context does not imply a classification level; rather, the term implies the need to protect the key from disclosure or substitution. SOURCE: FIPS 201 Secret Key – A cryptographic key that is uniquely associated with one or more entities. The use of the term “secret” in this context does not imply a classification level, but rather implies the need to protect the key from disclosure or substitution. SOURCE: FIPS 198 Secret Key – A cryptographic key, used with a secret key cryptographic algorithm, that is uniquely associated with one or more entities and should not be made public. SOURCE: FIPS 140-2 Pg 165
- Page 114 and 115: NIST IR 7298 Revision 1, Glossary o
- Page 116 and 117: NIST IR 7298 Revision 1, Glossary o
- Page 118 and 119: NIST IR 7298 Revision 1, Glossary o
- Page 120 and 121: NIST IR 7298 Revision 1, Glossary o
- Page 122 and 123: NIST IR 7298 Revision 1, Glossary o
- Page 124 and 125: NIST IR 7298 Revision 1, Glossary o
- Page 126 and 127: NIST IR 7298 Revision 1, Glossary o
- Page 128 and 129: NIST IR 7298 Revision 1, Glossary o
- Page 130 and 131: NIST IR 7298 Revision 1, Glossary o
- Page 132 and 133: NIST IR 7298 Revision 1, Glossary o
- Page 134 and 135: NIST IR 7298 Revision 1, Glossary o
- Page 136 and 137: NIST IR 7298 Revision 1, Glossary o
- Page 138 and 139: NIST IR 7298 Revision 1, Glossary o
- Page 140 and 141: NIST IR 7298 Revision 1, Glossary o
- Page 142 and 143: NIST IR 7298 Revision 1, Glossary o
- Page 144 and 145: NIST IR 7298 Revision 1, Glossary o
- Page 146 and 147: NIST IR 7298 Revision 1, Glossary o
- Page 148 and 149: NIST IR 7298 Revision 1, Glossary o
- Page 150 and 151: NIST IR 7298 Revision 1, Glossary o
- Page 152 and 153: NIST IR 7298 Revision 1, Glossary o
- Page 154 and 155: NIST IR 7298 Revision 1, Glossary o
- Page 156 and 157: NIST IR 7298 Revision 1, Glossary o
- Page 158 and 159: NIST IR 7298 Revision 1, Glossary o
- Page 160 and 161: NIST IR 7298 Revision 1, Glossary o
- Page 162 and 163: NIST IR 7298 Revision 1, Glossary o
- Page 166 and 167: NIST IR 7298 Revision 1, Glossary o
- Page 168 and 169: NIST IR 7298 Revision 1, Glossary o
- Page 170 and 171: NIST IR 7298 Revision 1, Glossary o
- Page 172 and 173: NIST IR 7298 Revision 1, Glossary o
- Page 174 and 175: NIST IR 7298 Revision 1, Glossary o
- Page 176 and 177: NIST IR 7298 Revision 1, Glossary o
- Page 178 and 179: NIST IR 7298 Revision 1, Glossary o
- Page 180 and 181: NIST IR 7298 Revision 1, Glossary o
- Page 182 and 183: NIST IR 7298 Revision 1, Glossary o
- Page 184 and 185: NIST IR 7298 Revision 1, Glossary o
- Page 186 and 187: NIST IR 7298 Revision 1, Glossary o
- Page 188 and 189: NIST IR 7298 Revision 1, Glossary o
- Page 190 and 191: NIST IR 7298 Revision 1, Glossary o
- Page 192 and 193: NIST IR 7298 Revision 1, Glossary o
- Page 194 and 195: NIST IR 7298 Revision 1, Glossary o
- Page 196 and 197: NIST IR 7298 Revision 1, Glossary o
- Page 198 and 199: NIST IR 7298 Revision 1, Glossary o
- Page 200 and 201: NIST IR 7298 Revision 1, Glossary o
- Page 202 and 203: NIST IR 7298 Revision 1, Glossary o
- Page 204 and 205: NIST IR 7298 Revision 1, Glossary o
- Page 206 and 207: NIST IR 7298 Revision 1, Glossary o
- Page 208 and 209: NIST IR 7298 Revision 1, Glossary o
- Page 210 and 211: NIST IR 7298, Glossary of Key Infor
NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />
Salt – A non-secret value that is used in a cryptographic process, usually to<br />
ensure that the results <strong>of</strong> computations for one instance cannot be<br />
reused by an attacker.<br />
SOURCE: SP 800-63; CNSSI-4009<br />
Sandboxing – A method <strong>of</strong> isolating application modules into distinct fault domains<br />
enforced by s<strong>of</strong>tware. The technique allows untrusted programs<br />
written in an unsafe language, such as C, to be executed safely within<br />
the single virtual address space <strong>of</strong> an application. Untrusted machine<br />
interpretable code modules are transformed so that all memory<br />
accesses are confined to code and data segments within their fault<br />
domain. Access to system resources can also be controlled through a<br />
unique identifier associated with each domain.<br />
SOURCE: SP 800-19<br />
Sanitization –<br />
A restricted, controlled execution environment that prevents<br />
potentially malicious s<strong>of</strong>tware, such as mobile code, from accessing<br />
any system resources except those for which the s<strong>of</strong>tware is<br />
authorized.<br />
SOURCE: CNSSI-4009<br />
Process to remove information from media such that information<br />
recovery is not possible. It includes removing all labels, markings,<br />
and activity logs.<br />
SOURCE: FIPS 200<br />
A general term referring to the actions taken to render data written on<br />
media unrecoverable by both ordinary and, for some forms <strong>of</strong><br />
sanitization, extraordinary means.<br />
SOURCE: SP 800-53; CNSSI-4009<br />
SCADA – See Supervisory Control and Data Acquisition.<br />
Scanning – Sending packets or requests to another system to gain information to<br />
be used in a subsequent attack.<br />
SOURCE: SP 800-61; CNSSI-4009<br />
Scavenging – Searching through object residue to acquire data.<br />
SOURCE: CNSSI-4009<br />
Pg 164