23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

<strong>Security</strong> Controls –<br />

<strong>Security</strong> Controls Baseline –<br />

The management, operational, and technical controls (i.e., safeguards<br />

or countermeasures) prescribed for an information system to protect<br />

the confidentiality, integrity, and availability <strong>of</strong> the system and its<br />

information.<br />

SOURCE: SP 800-53; SP 800-37; SP 800-53A; SP 800-60; FIPS<br />

200; FIPS 199; CNSSI-4009<br />

The set <strong>of</strong> minimum security controls defined for a low-impact,<br />

moderate-impact, or high-impact information system.<br />

SOURCE: CNSSI-4009<br />

<strong>Security</strong> Domain – A set <strong>of</strong> subjects, their information objects, and a common security<br />

policy.<br />

SOURCE: SP 800-27<br />

<strong>Security</strong> Domain – A collection <strong>of</strong> entities to which applies a single security policy<br />

executed by a single authority.<br />

SOURCE: FIPS 188<br />

A domain that implements a security policy and is administered by a<br />

single authority.<br />

SOURCE: SP 800-37; SP 800-53; CNSSI-4009<br />

<strong>Security</strong> Engineering – An interdisciplinary approach and means to enable the realization <strong>of</strong><br />

secure systems. It focuses on defining customer needs, security<br />

protection requirements, and required functionality early in the<br />

systems development life cycle, documenting requirements, and then<br />

proceeding with design, synthesis, and system validation while<br />

considering the complete problem.<br />

SOURCE: CNSSI-4009<br />

<strong>Security</strong> Fault Analysis (SFA) – An assessment, usually performed on information system hardware,<br />

to determine the security properties <strong>of</strong> a device when hardware fault<br />

is encountered.<br />

SOURCE: CNSSI-4009<br />

<strong>Security</strong> Features Users Guide –<br />

(SFUG)<br />

Guide or manual explaining how the security mechanisms in a<br />

specific system work.<br />

SOURCE: CNSSI-4009<br />

<strong>Security</strong> Filter – A secure subsystem <strong>of</strong> an information system that enforces security<br />

policy on the data passing through it.<br />

SOURCE: CNSSI-4009<br />

Pg 171

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!