23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

S<strong>of</strong>tware Assurance – Level <strong>of</strong> confidence that s<strong>of</strong>tware is free from vulnerabilities, either<br />

intentionally designed into the s<strong>of</strong>tware or accidentally inserted at<br />

anytime during its life cycle, and that the s<strong>of</strong>tware functions in the<br />

intended manner.<br />

SOURCE: CNSSI-4009<br />

S<strong>of</strong>tware System Test and<br />

Evaluation Process –<br />

Process that plans, develops, and documents the<br />

qualitative/quantitative demonstration <strong>of</strong> the fulfillment <strong>of</strong> all<br />

baseline functional performance, operational, and interface<br />

requirements.<br />

SOURCE: CNSSI-4009<br />

S<strong>of</strong>tware-Based Fault Isolation – A method <strong>of</strong> isolating application modules into distinct fault domains<br />

enforced by s<strong>of</strong>tware. The technique allows untrusted programs<br />

written in an unsafe language, such as C, to be executed safely within<br />

the single virtual address space <strong>of</strong> an application. Untrusted machine<br />

interpretable code modules are transformed so that all memory<br />

accesses are confined to code and data segments within their fault<br />

domain. Access to system resources can also be controlled through a<br />

unique identifier associated with each domain.<br />

SOURCE: SP 800-19<br />

Spam – The abuse <strong>of</strong> electronic messaging systems to indiscriminately send<br />

unsolicited bulk messages.<br />

SOURCE: SP 800-53<br />

Unsolicited bulk commercial email messages.<br />

SOURCE: SP 800-45<br />

Electronic junk mail or the abuse <strong>of</strong> electronic messaging systems to<br />

indiscriminately send unsolicited bulk messages.<br />

SOURCE: CNSSI-4009<br />

Spam Filtering S<strong>of</strong>tware – A program that analyzes emails to look for characteristics <strong>of</strong> spam,<br />

and typically places messages that appear to be spam in a separate<br />

email folder.<br />

SOURCE: SP 800-69<br />

Special Access Program (SAP) – A program established for a specific class <strong>of</strong> classified information<br />

that imposes safeguarding and access requirements that exceed those<br />

normally required for information at the same classification level.<br />

SOURCE: SP 800-53; CNSSI-4009<br />

Special Access Program Facility –<br />

(SAPF)<br />

Facility formally accredited by an appropriate agency in accordance<br />

with DCID 6/9 in which SAP information may be processed.<br />

SOURCE: CNSSI-4009<br />

Pg 180

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!