23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

System Development Life Cycle –<br />

(SDLC)<br />

System Development<br />

Methodologies –<br />

The scope <strong>of</strong> activities associated with a system, encompassing the<br />

system’s initiation, development and acquisition, implementation,<br />

operation and maintenance, and ultimately its disposal that instigates<br />

another system initiation.<br />

SOURCE: SP 800-34; CNSSI-4009<br />

Methodologies developed through s<strong>of</strong>tware engineering to manage<br />

the complexity <strong>of</strong> system development. Development methodologies<br />

include s<strong>of</strong>tware engineering aids and high-level design analysis<br />

tools.<br />

SOURCE: CNSSI-4009<br />

System High – Highest security level supported by an information system.<br />

SOURCE: CNSSI-4009<br />

System High Mode – <strong>Information</strong> systems security mode <strong>of</strong> operation wherein each user,<br />

with direct or indirect access to the information system, its<br />

peripherals, remote terminals, or remote hosts, has all <strong>of</strong> the<br />

following: a. valid security clearance for all information within an<br />

information system; b. formal access approval and signed<br />

nondisclosure agreements for all the information stored and/or<br />

processed (including all compartments, subcompartments and/or<br />

special access programs); and c. valid need-to-know for some <strong>of</strong> the<br />

information contained within the information system.<br />

SOURCE: CNSSI-4009<br />

System Indicator – Symbol or group <strong>of</strong> symbols in an <strong>of</strong>f-line encrypted message<br />

identifying the specific cryptosystem or key used in the encryption.<br />

SOURCE: CNSSI-4009<br />

System Integrity – The quality that a system has when it performs its intended function<br />

in an unimpaired manner, free from unauthorized manipulation <strong>of</strong> the<br />

system, whether intentional or accidental.<br />

SOURCE: SP 800-27<br />

Attribute <strong>of</strong> an information system when it performs its intended<br />

function in an unimpaired manner, free from deliberate or inadvertent<br />

unauthorized manipulation <strong>of</strong> the system.<br />

SOURCE: CNSSI-4009<br />

System Interconnection – The direct connection <strong>of</strong> two or more IT systems for the purpose <strong>of</strong><br />

sharing data and other information resources.<br />

SOURCE: SP 800-47; CNSSI-4009<br />

System Low – Lowest security level supported by an information system.<br />

SOURCE: CNSSI-4009<br />

Pg 187

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!