23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

<strong>Security</strong> Marking – Human-readable information affixed to information system<br />

components, removable media, or output indicating the distribution<br />

limitations, handling caveats, and applicable security markings.<br />

SOURCE: SP 800-53<br />

<strong>Security</strong> Markings – Human-readable indicators applied to a document, storage media, or<br />

hardware component to designate security classification,<br />

categorization, and/or handling restrictions applicable to the<br />

information contained therein. For intelligence information, these<br />

could include compartment and sub-compartment indicators and<br />

handling restrictions.<br />

SOURCE: CNSSI-4009<br />

<strong>Security</strong> Mechanism – A device designed to provide one or more security services usually<br />

rated in terms <strong>of</strong> strength <strong>of</strong> service and assurance <strong>of</strong> the design.<br />

SOURCE: CNSSI-4009<br />

<strong>Security</strong> Net Control Station – Management system overseeing and controlling implementation <strong>of</strong><br />

network security policy.<br />

SOURCE: CNSSI-4009<br />

<strong>Security</strong> Objective – Confidentiality, integrity, or availability.<br />

SOURCE: SP 800-53; SP 800-53A; SP 800-60; SP 800-37; FIPS<br />

200; FIPS 199<br />

<strong>Security</strong> Perimeter – See Authorization Boundary.<br />

A physical or logical boundary that is defined for a system, domain,<br />

or enclave, within which a particular security policy or security<br />

architecture is applied.<br />

SOURCE: CNSSI-4009<br />

<strong>Security</strong> Plan – Formal document that provides an overview <strong>of</strong> the security<br />

requirements for an information system or an information security<br />

program and describes the security controls in place or planned for<br />

meeting those requirements.<br />

See ‘System <strong>Security</strong> Plan’ or ‘<strong>Information</strong> <strong>Security</strong> Program Plan.’<br />

SOURCE: SP 800-53; SP 800-53A; SP 800-37; SP 800-18<br />

<strong>Security</strong> Policy – The statement <strong>of</strong> required protection <strong>of</strong> the information objects.<br />

SOURCE: SP 800-27<br />

Pg 173

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!