23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

System Of Records – A group <strong>of</strong> any records under the control <strong>of</strong> any agency from which<br />

information is retrieved by the name <strong>of</strong> the individual or by some<br />

identifying number, symbol, or other identifying particular assigned<br />

to the individual.<br />

SOURCE: SP 800-122<br />

System Owner – Person or organization having responsibility for the development,<br />

procurement, integration, modification, operation and maintenance,<br />

and/or final disposition <strong>of</strong> an information system.<br />

SOURCE: CNSSI-4009<br />

System Pr<strong>of</strong>ile – Detailed security description <strong>of</strong> the physical structure, equipment<br />

component, location, relationships, and general operating<br />

environment <strong>of</strong> an information system.<br />

SOURCE: CNSSI-4009<br />

System <strong>Security</strong> – See <strong>Information</strong> System <strong>Security</strong>.<br />

System <strong>Security</strong> Plan –<br />

Formal document that provides an overview <strong>of</strong> the security<br />

requirements for the information system and describes the security<br />

controls in place or planned for meeting those requirements.<br />

SOURCE: SP 800-37; SP 800-53; SP 800-53A; SP 800-18; FIPS 200<br />

The formal document prepared by the information system owner (or<br />

common security controls owner for inherited controls) that provides<br />

an overview <strong>of</strong> the security requirements for the system and describes<br />

the security controls in place or planned for meeting those<br />

requirements. The plan can also contain as supporting appendices or<br />

as references, other key security-related documents such as a risk<br />

assessment, privacy impact assessment, system interconnection<br />

agreements, contingency plan, security configurations, configuration<br />

management plan, and incident response plan.<br />

SOURCE: CNSSI-4009<br />

System S<strong>of</strong>tware – The special s<strong>of</strong>tware within the cryptographic boundary (e.g.,<br />

operating system, compilers or utility programs) designed for a<br />

specific computer system or family <strong>of</strong> computer systems to facilitate<br />

the operation and maintenance <strong>of</strong> the computer system, associated<br />

programs, and data.<br />

SOURCE: FIPS 140-2<br />

System-Specific <strong>Security</strong> Control – A security control for an information system that has not been<br />

designated as a common security control or the portion <strong>of</strong> a hybrid<br />

control that is to be implemented within an information system.<br />

SOURCE: SP 800-37; SP 800-53; SP 800-53A; CNSSI-4009<br />

Systems <strong>Security</strong> Engineering – See <strong>Information</strong> Systems <strong>Security</strong> Engineering.<br />

Pg 188

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!