23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

<strong>Security</strong> Policy – A set <strong>of</strong> criteria for the provision <strong>of</strong> security services. It defines and<br />

constrains the activities <strong>of</strong> a data processing facility in order to<br />

maintain a condition <strong>of</strong> security for systems and data.<br />

SOURCE: FIPS 188<br />

A set <strong>of</strong> criteria for the provision <strong>of</strong> security services.<br />

SOURCE: SP 800-37; SP 800-53; CNSSI-4009<br />

<strong>Security</strong> Posture – The security status <strong>of</strong> an enterprise’s networks, information, and<br />

systems based on IA resources (e.g., people, hardware, s<strong>of</strong>tware,<br />

policies) and capabilities in place to manage the defense <strong>of</strong> the<br />

enterprise and to react as the situation changes.<br />

SOURCE: CNSSI-4009<br />

<strong>Security</strong> Program Plan – Formal document that provides an overview <strong>of</strong> the security<br />

requirements for an organization-wide information security program<br />

and describes the program management security controls and<br />

common security controls in place or planned for meeting those<br />

requirements.<br />

SOURCE: CNSSI-4009<br />

<strong>Security</strong> Range – Highest and lowest security levels that are permitted in or on an<br />

information system, system component, subsystem, or network.<br />

SOURCE: CNSSI-4009<br />

<strong>Security</strong>-Relevant Change – Any change to a system’s configuration, environment, information<br />

content, functionality, or users which has the potential to change the<br />

risk imposed upon its continued operations.<br />

SOURCE: CNSSI-4009<br />

<strong>Security</strong>-Relevant Event – An occurrence (e.g., an auditable event or flag) considered to have<br />

potential security implications to the system or its environment that<br />

may require further action (noting, investigating, or reacting).<br />

SOURCE: CNSSI-4009<br />

<strong>Security</strong>-Relevant <strong>Information</strong> – Any information within the information system that can potentially<br />

impact the operation <strong>of</strong> security functions in a manner that could<br />

result in failure to enforce the system security policy or maintain<br />

isolation <strong>of</strong> code and data.<br />

SOURCE: SP 800-53<br />

Pg 174

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!