23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Scoping Guidance – A part <strong>of</strong> tailoring guidance providing organizations with specific<br />

policy/regulatory-related, technology-related, system component<br />

allocation-related, operational/environmental-related, physical<br />

infrastructure-related, public access-related, scalability-related,<br />

common control-related, and security objective-related<br />

considerations on the applicability and implementation <strong>of</strong> individual<br />

security controls in the security control baseline.<br />

SOURCE: SP 800-53<br />

Scoping Guidance – Specific factors related to technology, infrastructure, public access,<br />

scalability, common security controls, and risk that can be considered<br />

by organizations in the applicability and implementation <strong>of</strong><br />

individual security controls in the security control baseline.<br />

SOURCE: FIPS 200; CNSSI-4009<br />

Secret <strong>Key</strong> – A cryptographic key that is used with a secret key (symmetric)<br />

cryptographic algorithm, that is uniquely associated with one or more<br />

entities and is not made public. The use <strong>of</strong> the term “secret” in this<br />

context does not imply a classification level, but rather implies the<br />

need to protect the key from disclosure.<br />

SOURCE: SP 800-57<br />

A cryptographic key that is used with a symmetric cryptographic<br />

algorithm that is uniquely associated with one or more entities and is<br />

not made public. The use <strong>of</strong> the term “secret” in this context does not<br />

imply a classification level, but rather implies the need to protect the<br />

key from disclosure.<br />

SOURCE: CNSSI-4009<br />

Secret <strong>Key</strong> – A cryptographic key that must be protected from unauthorized<br />

disclosure to protect data encrypted with the key. The use <strong>of</strong> the term<br />

“secret” in this context does not imply a classification level; rather,<br />

the term implies the need to protect the key from disclosure or<br />

substitution.<br />

SOURCE: FIPS 201<br />

Secret <strong>Key</strong> – A cryptographic key that is uniquely associated with one or more<br />

entities. The use <strong>of</strong> the term “secret” in this context does not imply a<br />

classification level, but rather implies the need to protect the key<br />

from disclosure or substitution.<br />

SOURCE: FIPS 198<br />

Secret <strong>Key</strong> – A cryptographic key, used with a secret key cryptographic algorithm,<br />

that is uniquely associated with one or more entities and should not<br />

be made public.<br />

SOURCE: FIPS 140-2<br />

Pg 165

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!