23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Special Character – Any non-alphanumeric character that can be rendered on a standard<br />

American-English keyboard. Use <strong>of</strong> a specific special character may<br />

be application-dependent.<br />

The list <strong>of</strong> special characters follows:<br />

` ~ ! @ # $ % ^ & * ( ) _ + | } { “ : ? > < [ ] \ ; ’ , . / - =<br />

SOURCE: CNSSI-4009<br />

Specification – An assessment object that includes document-based artifacts (e.g.,<br />

policies, procedures, plans, system security requirements, functional<br />

specifications, and architectural designs) associated with an<br />

information system.<br />

SOURCE: SP 800-53A<br />

Spillage – <strong>Security</strong> incident that results in the transfer <strong>of</strong> classified or CUI<br />

information onto an information system not accredited (i.e.,<br />

authorized) for the appropriate security level.<br />

SOURCE: CNSSI-4009<br />

Split Knowledge – A procedure by which a cryptographic key is split into n multiple key<br />

components, individually providing no knowledge <strong>of</strong> the original<br />

key, which can be subsequently combined to recreate the original<br />

cryptographic key<br />

SOURCE: SP 800-57<br />

Split Knowledge – A process by which a cryptographic key is split into multiple key<br />

components, individually sharing no knowledge <strong>of</strong> the original key,<br />

that can be subsequently input into, or output from, a cryptographic<br />

module by separate entities and combined to recreate the original<br />

cryptographic key.<br />

SOURCE: FIPS 140-2<br />

1. Separation <strong>of</strong> data or information into two or more parts, each part<br />

constantly kept under control <strong>of</strong> separate authorized individuals or<br />

teams so that no one individual or team will know the whole data.<br />

2. A process by which a cryptographic key is split into multiple key<br />

components, individually sharing no knowledge <strong>of</strong> the original key,<br />

which can be subsequently input into, or output from, a cryptographic<br />

module by separate entities and combined to recreate the original<br />

cryptographic key.<br />

SOURCE: CNSSI-4009<br />

Spo<strong>of</strong>ing – “IP spo<strong>of</strong>ing” refers to sending a network packet that appears to<br />

come from a source other than its actual source.<br />

SOURCE: SP 800-48<br />

Pg 181

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!