NISTIR 7298 Revision 1, Glossary of Key Information Security Terms
NISTIR 7298 Revision 1, Glossary of Key Information Security Terms NISTIR 7298 Revision 1, Glossary of Key Information Security Terms
NIST IR 7298 Revision 1, Glossary of Key Information Security Terms A number associated with the amount of work (that is, the number of operations) that is required to break a cryptographic algorithm or system. Sometimes referred to as a security level. SOURCE: FIPS 186 Security Tag – Information unit containing a representation of certain securityrelated information (e.g., a restrictive attribute bit map). SOURCE: FIPS 188 Security Target – Common Criteria specification that represents a set of security requirements to be used as the basis of an evaluation of an identified Target of Evaluation (TOE). SOURCE: CNSSI-4009 Security Test & Evaluation – (ST&E) Security Testing – Examination and analysis of the safeguards required to protect an information system, as they have been applied in an operational environment, to determine the security posture of that system. SOURCE: CNSSI-4009 Process to determine that an information system protects data and maintains functionality as intended. SOURCE: CNSSI-4009 Seed Key – Initial key used to start an updating or key generation process. SOURCE: CNSSI-4009 Senior Agency Information Security Officer (SAISO) – Senior Information Security Officer – Sensitive Compartmented Information (SCI) – Official responsible for carrying out the Chief Information Officer responsibilities under the Federal Information Security Management Act (FISMA) and serving as the Chief Information Officer’s primary liaison to the agency’s authorizing officials, information system owners, and information system security officers. SP 800-53 Note: Organizations subordinate to federal agencies may use the term Senior Information Security Officer or Chief Information Security Officer to denote individuals filling positions with similar responsibilities to Senior Agency Information Security Officers. SOURCE: SP 800-53; SP 800-53A; SP 800-37; SP 800-60; FIPS 200; CNSSI-4009; 44 U.S.C., Sec. 3544 See Senior Agency Information Security Officer. Classified information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems established by the Director of National Intelligence. SOURCE: SP 800-53; CNSSI-4009 Pg 176
NIST IR 7298 Revision 1, Glossary of Key Information Security Terms Sensitive Compartmented Information Facility (SCIF) – Accredited area, room, or group of rooms, buildings, or installation where SCI may be stored, used, discussed, and/or processed. SOURCE: CNSSI-4009 Sensitive Information – Information, the loss, misuse, or unauthorized access to or modification of, that could adversely affect the national interest or the conduct of federal programs, or the privacy to which individuals are entitled under 5 U.S.C. Section 552a (the Privacy Act), but that has not been specifically authorized under criteria established by an Executive Order or an Act of Congress to be kept classified in the interest of national defense or foreign policy. SOURCE: SP 800-53 Information, the loss, misuse, or unauthorized access to or modification of, that could adversely affect the national interest or the conduct of federal programs, or the privacy to which individuals are entitled under 5 U.S.C. Section 552a (the Privacy Act), but that has not been specifically authorized under criteria established by an Executive Order or an Act of Congress to be kept classified in the interest of national defense or foreign policy. (Systems that are not national security systems, but contain sensitive information, are to be protected in accordance with the requirements of the Computer Security Act of 1987 [P.L.100-235].) SOURCE: CNSSI-4009 Sensitivity – A measure of the importance assigned to information by its owner, for the purpose of denoting its need for protection. SOURCE: SP 800-60; CNSSI-4009 Sensitivity Label – Information representing elements of the security label(s) of a subject and an object. Sensitivity labels are used by the trusted computing base (TCB) as the basis for mandatory access control decisions. See security label. SOURCE: CNSSI-4009 Service-Level Agreement – Defines the specific responsibilities of the service provider and sets the customer expectations. SOURCE: CNSSI-4009 Shared Secret – A secret used in authentication that is known to the claimant and the verifier. SOURCE: SP 800-63 Shielded Enclosure – Room or container designed to attenuate electromagnetic radiation, acoustic signals, or emanations. SOURCE: CNSSI-4009 Pg 177
- Page 126 and 127: NIST IR 7298 Revision 1, Glossary o
- Page 128 and 129: NIST IR 7298 Revision 1, Glossary o
- Page 130 and 131: NIST IR 7298 Revision 1, Glossary o
- Page 132 and 133: NIST IR 7298 Revision 1, Glossary o
- Page 134 and 135: NIST IR 7298 Revision 1, Glossary o
- Page 136 and 137: NIST IR 7298 Revision 1, Glossary o
- Page 138 and 139: NIST IR 7298 Revision 1, Glossary o
- Page 140 and 141: NIST IR 7298 Revision 1, Glossary o
- Page 142 and 143: NIST IR 7298 Revision 1, Glossary o
- Page 144 and 145: NIST IR 7298 Revision 1, Glossary o
- Page 146 and 147: NIST IR 7298 Revision 1, Glossary o
- Page 148 and 149: NIST IR 7298 Revision 1, Glossary o
- Page 150 and 151: NIST IR 7298 Revision 1, Glossary o
- Page 152 and 153: NIST IR 7298 Revision 1, Glossary o
- Page 154 and 155: NIST IR 7298 Revision 1, Glossary o
- Page 156 and 157: NIST IR 7298 Revision 1, Glossary o
- Page 158 and 159: NIST IR 7298 Revision 1, Glossary o
- Page 160 and 161: NIST IR 7298 Revision 1, Glossary o
- Page 162 and 163: NIST IR 7298 Revision 1, Glossary o
- Page 164 and 165: NIST IR 7298 Revision 1, Glossary o
- Page 166 and 167: NIST IR 7298 Revision 1, Glossary o
- Page 168 and 169: NIST IR 7298 Revision 1, Glossary o
- Page 170 and 171: NIST IR 7298 Revision 1, Glossary o
- Page 172 and 173: NIST IR 7298 Revision 1, Glossary o
- Page 174 and 175: NIST IR 7298 Revision 1, Glossary o
- Page 178 and 179: NIST IR 7298 Revision 1, Glossary o
- Page 180 and 181: NIST IR 7298 Revision 1, Glossary o
- Page 182 and 183: NIST IR 7298 Revision 1, Glossary o
- Page 184 and 185: NIST IR 7298 Revision 1, Glossary o
- Page 186 and 187: NIST IR 7298 Revision 1, Glossary o
- Page 188 and 189: NIST IR 7298 Revision 1, Glossary o
- Page 190 and 191: NIST IR 7298 Revision 1, Glossary o
- Page 192 and 193: NIST IR 7298 Revision 1, Glossary o
- Page 194 and 195: NIST IR 7298 Revision 1, Glossary o
- Page 196 and 197: NIST IR 7298 Revision 1, Glossary o
- Page 198 and 199: NIST IR 7298 Revision 1, Glossary o
- Page 200 and 201: NIST IR 7298 Revision 1, Glossary o
- Page 202 and 203: NIST IR 7298 Revision 1, Glossary o
- Page 204 and 205: NIST IR 7298 Revision 1, Glossary o
- Page 206 and 207: NIST IR 7298 Revision 1, Glossary o
- Page 208 and 209: NIST IR 7298 Revision 1, Glossary o
- Page 210 and 211: NIST IR 7298, Glossary of Key Infor
NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />
Sensitive Compartmented<br />
<strong>Information</strong> Facility (SCIF) –<br />
Accredited area, room, or group <strong>of</strong> rooms, buildings, or installation<br />
where SCI may be stored, used, discussed, and/or processed.<br />
SOURCE: CNSSI-4009<br />
Sensitive <strong>Information</strong> – <strong>Information</strong>, the loss, misuse, or unauthorized access to or<br />
modification <strong>of</strong>, that could adversely affect the national interest or the<br />
conduct <strong>of</strong> federal programs, or the privacy to which individuals are<br />
entitled under 5 U.S.C. Section 552a (the Privacy Act), but that has<br />
not been specifically authorized under criteria established by an<br />
Executive Order or an Act <strong>of</strong> Congress to be kept classified in the<br />
interest <strong>of</strong> national defense or foreign policy.<br />
SOURCE: SP 800-53<br />
<strong>Information</strong>, the loss, misuse, or unauthorized access to or<br />
modification <strong>of</strong>, that could adversely affect the national interest or the<br />
conduct <strong>of</strong> federal programs, or the privacy to which individuals are<br />
entitled under 5 U.S.C. Section 552a (the Privacy Act), but that has<br />
not been specifically authorized under criteria established by an<br />
Executive Order or an Act <strong>of</strong> Congress to be kept classified in the<br />
interest <strong>of</strong> national defense or foreign policy. (Systems that are not<br />
national security systems, but contain sensitive information, are to be<br />
protected in accordance with the requirements <strong>of</strong> the Computer<br />
<strong>Security</strong> Act <strong>of</strong> 1987 [P.L.100-235].)<br />
SOURCE: CNSSI-4009<br />
Sensitivity – A measure <strong>of</strong> the importance assigned to information by its owner,<br />
for the purpose <strong>of</strong> denoting its need for protection.<br />
SOURCE: SP 800-60; CNSSI-4009<br />
Sensitivity Label – <strong>Information</strong> representing elements <strong>of</strong> the security label(s) <strong>of</strong> a subject<br />
and an object. Sensitivity labels are used by the trusted computing<br />
base (TCB) as the basis for mandatory access control decisions. See<br />
security label.<br />
SOURCE: CNSSI-4009<br />
Service-Level Agreement – Defines the specific responsibilities <strong>of</strong> the service provider and sets<br />
the customer expectations.<br />
SOURCE: CNSSI-4009<br />
Shared Secret – A secret used in authentication that is known to the claimant and the<br />
verifier.<br />
SOURCE: SP 800-63<br />
Shielded Enclosure – Room or container designed to attenuate electromagnetic radiation,<br />
acoustic signals, or emanations.<br />
SOURCE: CNSSI-4009<br />
Pg 177