23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

A number associated with the amount <strong>of</strong> work (that is, the number <strong>of</strong><br />

operations) that is required to break a cryptographic algorithm or<br />

system. Sometimes referred to as a security level.<br />

SOURCE: FIPS 186<br />

<strong>Security</strong> Tag – <strong>Information</strong> unit containing a representation <strong>of</strong> certain securityrelated<br />

information (e.g., a restrictive attribute bit map).<br />

SOURCE: FIPS 188<br />

<strong>Security</strong> Target – Common Criteria specification that represents a set <strong>of</strong> security<br />

requirements to be used as the basis <strong>of</strong> an evaluation <strong>of</strong> an identified<br />

Target <strong>of</strong> Evaluation (TOE).<br />

SOURCE: CNSSI-4009<br />

<strong>Security</strong> Test & Evaluation –<br />

(ST&E)<br />

<strong>Security</strong> Testing –<br />

Examination and analysis <strong>of</strong> the safeguards required to protect an<br />

information system, as they have been applied in an operational<br />

environment, to determine the security posture <strong>of</strong> that system.<br />

SOURCE: CNSSI-4009<br />

Process to determine that an information system protects data and<br />

maintains functionality as intended.<br />

SOURCE: CNSSI-4009<br />

Seed <strong>Key</strong> – Initial key used to start an updating or key generation process.<br />

SOURCE: CNSSI-4009<br />

Senior Agency <strong>Information</strong> <strong>Security</strong><br />

Officer (SAISO) –<br />

Senior <strong>Information</strong> <strong>Security</strong><br />

Officer –<br />

Sensitive Compartmented<br />

<strong>Information</strong> (SCI) –<br />

Official responsible for carrying out the Chief <strong>Information</strong> Officer<br />

responsibilities under the Federal <strong>Information</strong> <strong>Security</strong> Management<br />

Act (FISMA) and serving as the Chief <strong>Information</strong> Officer’s primary<br />

liaison to the agency’s authorizing <strong>of</strong>ficials, information system<br />

owners, and information system security <strong>of</strong>ficers.<br />

SP 800-53 Note: Organizations subordinate to federal agencies may use the<br />

term Senior <strong>Information</strong> <strong>Security</strong> Officer or Chief <strong>Information</strong> <strong>Security</strong><br />

Officer to denote individuals filling positions with similar responsibilities to<br />

Senior Agency <strong>Information</strong> <strong>Security</strong> Officers.<br />

SOURCE: SP 800-53; SP 800-53A; SP 800-37; SP 800-60; FIPS<br />

200; CNSSI-4009; 44 U.S.C., Sec. 3544<br />

See Senior Agency <strong>Information</strong> <strong>Security</strong> Officer.<br />

Classified information concerning or derived from intelligence<br />

sources, methods, or analytical processes, which is required to be<br />

handled within formal access control systems established by the<br />

Director <strong>of</strong> National Intelligence.<br />

SOURCE: SP 800-53; CNSSI-4009<br />

Pg 176

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!