23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Spo<strong>of</strong>ing – Involves—<br />

1) the ability to receive a message by masquerading as the legitimate<br />

receiving destination, or<br />

2) masquerading as the sending machine and sending a message to a<br />

destination.<br />

SOURCE: FIPS 191<br />

1. Faking the sending address <strong>of</strong> a transmission to gain illegal entry<br />

into a secure system. Impersonating, masquerading, piggybacking,<br />

and mimicking are forms <strong>of</strong> spo<strong>of</strong>ing.<br />

2. The deliberate inducement <strong>of</strong> a user or resource to take incorrect<br />

action.<br />

SOURCE: CNSSI-4009<br />

Spread Spectrum – Telecommunications techniques in which a signal is transmitted in a<br />

bandwidth considerably greater than the frequency content <strong>of</strong> the<br />

original information. Frequency hopping, direct sequence spreading,<br />

time scrambling, and combinations <strong>of</strong> these techniques are forms <strong>of</strong><br />

spread spectrum.<br />

SOURCE: CNSSI-4009<br />

Spyware – S<strong>of</strong>tware that is secretly or surreptitiously installed into an<br />

information system to gather information on individuals or<br />

organizations without their knowledge; a type <strong>of</strong> malicious code.<br />

SOURCE: SP 800-53; CNSSI-4009<br />

SSL – See Secure Sockets Layer.<br />

Standard – A published statement on a topic specifying characteristics, usually<br />

measurable, that must be satisfied or achieved in order to comply<br />

with the standard.<br />

SOURCE: FIPS 201<br />

Start-Up KEK <strong>Key</strong>-encryption-key held in common by a group <strong>of</strong> potential<br />

communicating entities and used to establish ad hoc tactical<br />

networks.<br />

SOURCE: CNSSI-4009<br />

State – Intermediate Cipher result that can be pictured as a rectangular array<br />

<strong>of</strong> bytes.<br />

SOURCE: FIPS 197<br />

Static <strong>Key</strong> – A key that is intended for use for a relatively long period <strong>of</strong> time and<br />

is typically intended for use in many instances <strong>of</strong> a cryptographic key<br />

establish scheme<br />

SOURCE: SP 800-57<br />

Pg 182

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!