23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

<strong>Security</strong> Functions – The hardware, s<strong>of</strong>tware, and/or firmware <strong>of</strong> the information system<br />

responsible for enforcing the system security policy and supporting<br />

the isolation <strong>of</strong> code and data on which the protection is based.<br />

SOURCE: SP 800-53<br />

<strong>Security</strong> Goals – The five security goals are confidentiality, availability, integrity,<br />

accountability, and assurance.<br />

SOURCE: SP 800-27<br />

<strong>Security</strong> Impact Analysis – The analysis conducted by an organizational <strong>of</strong>ficial to determine the<br />

extent to which changes to the information system have affected the<br />

security state <strong>of</strong> the system.<br />

SOURCE: SP 800-53; SP 800-53A; SP 800-37; CNSSI-4009<br />

<strong>Security</strong> Incident – See Incident.<br />

<strong>Security</strong> Inspection – Examination <strong>of</strong> an information system to determine compliance with<br />

security policy, procedures, and practices.<br />

SOURCE: CNSSI-4009<br />

<strong>Security</strong> Kernel – Hardware, firmware, and s<strong>of</strong>tware elements <strong>of</strong> a trusted computing<br />

base implementing the reference monitor concept. <strong>Security</strong> kernel<br />

must mediate all accesses, be protected from modification, and be<br />

verifiable as correct.<br />

SOURCE: CNSSI-4009<br />

<strong>Security</strong> Label – The means used to associate a set <strong>of</strong> security attributes with a specific<br />

information object as part <strong>of</strong> the data structure for that object.<br />

SOURCE: SP 800-53<br />

<strong>Security</strong> Label – A marking bound to a resource (which may be a data unit) that names<br />

or designates the security attributes <strong>of</strong> that resource.<br />

SOURCE: FIPS 188<br />

<strong>Information</strong> that represents or designates the value <strong>of</strong> one or more<br />

security relevant-attributes (e.g., classification) <strong>of</strong> a system resource.<br />

SOURCE: CNSSI-4009<br />

<strong>Security</strong> Level – A hierarchical indicator <strong>of</strong> the degree <strong>of</strong> sensitivity to a certain threat.<br />

It implies, according to the security policy being enforced, a specific<br />

level <strong>of</strong> protection.<br />

SOURCE: FIPS 188<br />

Pg 172

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!