23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Syllabary – List <strong>of</strong> individual letters, combination <strong>of</strong> letters, or syllables, with<br />

their equivalent code groups, used for spelling out words or proper<br />

names not present in the vocabulary <strong>of</strong> a code. A syllabary may also<br />

be a spelling table.<br />

SOURCE: CNSSI-4009<br />

Symmetric Encryption Algorithm – Encryption algorithms using the same secret key for encryption and<br />

decryption.<br />

SOURCE: SP 800-49; CNSSI-4009<br />

Symmetric <strong>Key</strong> – A cryptographic key that is used to perform both the cryptographic<br />

operation and its inverse, for example to encrypt and decrypt, or<br />

create a message authentication code and to verify the code.<br />

SOURCE: SP 800-63; CNSSI-4009<br />

Symmetric <strong>Key</strong> – A single cryptographic key that is used with a secret (symmetric) key<br />

algorithm.<br />

SOURCE: SP 800-21 [2 nd Ed]<br />

Synchronous Crypto-Operation – Encryption algorithms using the same secret key for encryption and<br />

decryption.<br />

SOURCE: CNSSI-4009<br />

System – See <strong>Information</strong> System.<br />

Any organized assembly <strong>of</strong> resources and procedures united and<br />

regulated by interaction or interdependence to accomplish a set <strong>of</strong><br />

specific functions. See also information system.<br />

SOURCE: CNSSI-4009<br />

System Administrator – A person who manages the technical aspects <strong>of</strong> a system.<br />

SOURCE: SP 800-40<br />

Individual responsible for the installation and maintenance <strong>of</strong> an<br />

information system, providing effective information system<br />

utilization, adequate security parameters, and sound implementation<br />

<strong>of</strong> established <strong>Information</strong> Assurance policy and procedures.<br />

SOURCE: CNSSI-4009<br />

System Assets – Any s<strong>of</strong>tware, hardware, data, administrative, physical,<br />

communications, or personnel resource within an information system.<br />

SOURCE: CNSSI-4009<br />

Pg 186

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!