NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

csrc.nist.gov
from csrc.nist.gov More from this publisher
23.03.2013 Views

NIST IR 7298 Revision 1, Glossary of Key Information Security Terms A number associated with the amount of work (that is, the number of operations) that is required to break a cryptographic algorithm or system. Sometimes referred to as a security level. SOURCE: FIPS 186 Security Tag – Information unit containing a representation of certain securityrelated information (e.g., a restrictive attribute bit map). SOURCE: FIPS 188 Security Target – Common Criteria specification that represents a set of security requirements to be used as the basis of an evaluation of an identified Target of Evaluation (TOE). SOURCE: CNSSI-4009 Security Test & Evaluation – (ST&E) Security Testing – Examination and analysis of the safeguards required to protect an information system, as they have been applied in an operational environment, to determine the security posture of that system. SOURCE: CNSSI-4009 Process to determine that an information system protects data and maintains functionality as intended. SOURCE: CNSSI-4009 Seed Key – Initial key used to start an updating or key generation process. SOURCE: CNSSI-4009 Senior Agency Information Security Officer (SAISO) – Senior Information Security Officer – Sensitive Compartmented Information (SCI) – Official responsible for carrying out the Chief Information Officer responsibilities under the Federal Information Security Management Act (FISMA) and serving as the Chief Information Officer’s primary liaison to the agency’s authorizing officials, information system owners, and information system security officers. SP 800-53 Note: Organizations subordinate to federal agencies may use the term Senior Information Security Officer or Chief Information Security Officer to denote individuals filling positions with similar responsibilities to Senior Agency Information Security Officers. SOURCE: SP 800-53; SP 800-53A; SP 800-37; SP 800-60; FIPS 200; CNSSI-4009; 44 U.S.C., Sec. 3544 See Senior Agency Information Security Officer. Classified information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems established by the Director of National Intelligence. SOURCE: SP 800-53; CNSSI-4009 Pg 176

NIST IR 7298 Revision 1, Glossary of Key Information Security Terms Sensitive Compartmented Information Facility (SCIF) – Accredited area, room, or group of rooms, buildings, or installation where SCI may be stored, used, discussed, and/or processed. SOURCE: CNSSI-4009 Sensitive InformationInformation, the loss, misuse, or unauthorized access to or modification of, that could adversely affect the national interest or the conduct of federal programs, or the privacy to which individuals are entitled under 5 U.S.C. Section 552a (the Privacy Act), but that has not been specifically authorized under criteria established by an Executive Order or an Act of Congress to be kept classified in the interest of national defense or foreign policy. SOURCE: SP 800-53 Information, the loss, misuse, or unauthorized access to or modification of, that could adversely affect the national interest or the conduct of federal programs, or the privacy to which individuals are entitled under 5 U.S.C. Section 552a (the Privacy Act), but that has not been specifically authorized under criteria established by an Executive Order or an Act of Congress to be kept classified in the interest of national defense or foreign policy. (Systems that are not national security systems, but contain sensitive information, are to be protected in accordance with the requirements of the Computer Security Act of 1987 [P.L.100-235].) SOURCE: CNSSI-4009 Sensitivity – A measure of the importance assigned to information by its owner, for the purpose of denoting its need for protection. SOURCE: SP 800-60; CNSSI-4009 Sensitivity Label – Information representing elements of the security label(s) of a subject and an object. Sensitivity labels are used by the trusted computing base (TCB) as the basis for mandatory access control decisions. See security label. SOURCE: CNSSI-4009 Service-Level Agreement – Defines the specific responsibilities of the service provider and sets the customer expectations. SOURCE: CNSSI-4009 Shared Secret – A secret used in authentication that is known to the claimant and the verifier. SOURCE: SP 800-63 Shielded Enclosure – Room or container designed to attenuate electromagnetic radiation, acoustic signals, or emanations. SOURCE: CNSSI-4009 Pg 177

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Sensitive Compartmented<br />

<strong>Information</strong> Facility (SCIF) –<br />

Accredited area, room, or group <strong>of</strong> rooms, buildings, or installation<br />

where SCI may be stored, used, discussed, and/or processed.<br />

SOURCE: CNSSI-4009<br />

Sensitive <strong>Information</strong> – <strong>Information</strong>, the loss, misuse, or unauthorized access to or<br />

modification <strong>of</strong>, that could adversely affect the national interest or the<br />

conduct <strong>of</strong> federal programs, or the privacy to which individuals are<br />

entitled under 5 U.S.C. Section 552a (the Privacy Act), but that has<br />

not been specifically authorized under criteria established by an<br />

Executive Order or an Act <strong>of</strong> Congress to be kept classified in the<br />

interest <strong>of</strong> national defense or foreign policy.<br />

SOURCE: SP 800-53<br />

<strong>Information</strong>, the loss, misuse, or unauthorized access to or<br />

modification <strong>of</strong>, that could adversely affect the national interest or the<br />

conduct <strong>of</strong> federal programs, or the privacy to which individuals are<br />

entitled under 5 U.S.C. Section 552a (the Privacy Act), but that has<br />

not been specifically authorized under criteria established by an<br />

Executive Order or an Act <strong>of</strong> Congress to be kept classified in the<br />

interest <strong>of</strong> national defense or foreign policy. (Systems that are not<br />

national security systems, but contain sensitive information, are to be<br />

protected in accordance with the requirements <strong>of</strong> the Computer<br />

<strong>Security</strong> Act <strong>of</strong> 1987 [P.L.100-235].)<br />

SOURCE: CNSSI-4009<br />

Sensitivity – A measure <strong>of</strong> the importance assigned to information by its owner,<br />

for the purpose <strong>of</strong> denoting its need for protection.<br />

SOURCE: SP 800-60; CNSSI-4009<br />

Sensitivity Label – <strong>Information</strong> representing elements <strong>of</strong> the security label(s) <strong>of</strong> a subject<br />

and an object. Sensitivity labels are used by the trusted computing<br />

base (TCB) as the basis for mandatory access control decisions. See<br />

security label.<br />

SOURCE: CNSSI-4009<br />

Service-Level Agreement – Defines the specific responsibilities <strong>of</strong> the service provider and sets<br />

the customer expectations.<br />

SOURCE: CNSSI-4009<br />

Shared Secret – A secret used in authentication that is known to the claimant and the<br />

verifier.<br />

SOURCE: SP 800-63<br />

Shielded Enclosure – Room or container designed to attenuate electromagnetic radiation,<br />

acoustic signals, or emanations.<br />

SOURCE: CNSSI-4009<br />

Pg 177

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!