23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Single Point <strong>Key</strong>ing – Means <strong>of</strong> distributing key to multiple, local crypto equipment or<br />

devices from a single fill point.<br />

SOURCE: CNSSI-4009<br />

Single-Hop Problem – The security risks resulting from a mobile s<strong>of</strong>tware agent moving<br />

from its home platform to another platform.<br />

SOURCE: SP 800-19<br />

Situational Awareness – Within a volume <strong>of</strong> time and space, the perception <strong>of</strong> an enterprise’s<br />

security posture and its threat environment; the<br />

comprehension/meaning <strong>of</strong> both taken together (risk); and the<br />

projection <strong>of</strong> their status into the near future.<br />

SOURCE: CNSSI-4009<br />

Skimming – The unauthorized use <strong>of</strong> a reader to read tags without the<br />

authorization or knowledge <strong>of</strong> the tag’s owner or the individual in<br />

possession <strong>of</strong> the tag.<br />

SOURCE: SP 800-98<br />

Smart Card – A credit card-sized card with embedded integrated circuits that can<br />

store, process, and communicate information.<br />

SOURCE: CNSSI-4009<br />

Sniffer – See Packet Sniffer or Passive Wiretapping.<br />

Social Engineering – An attempt to trick someone into revealing information (e.g., a<br />

password) that can be used to attack systems or networks.<br />

SOURCE: SP 800-61<br />

A general term for attackers trying to trick people into revealing<br />

sensitive information or performing certain actions, such as<br />

downloading and executing files that appear to be benign but are<br />

actually malicious.<br />

SOURCE: SP 800-114<br />

The process <strong>of</strong> attempting to trick someone into revealing<br />

information (e.g., a password).<br />

SOURCE: SP 800-115<br />

An attempt to trick someone into revealing information (e.g., a<br />

password) that can be used to attack an enterprise.<br />

SOURCE: CNSSI-4009<br />

S<strong>of</strong>tware – Computer programs and associated data that may be dynamically<br />

written or modified during execution.<br />

SOURCE: CNSSI-4009<br />

Pg 179

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!