23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Systems <strong>Security</strong> Officer – See <strong>Information</strong> Systems <strong>Security</strong> Officer.<br />

Tabletop Exercise – A discussion-based exercise where personnel with roles and<br />

responsibilities in a particular IT plan meet in a classroom setting or<br />

in breakout groups to validate the content <strong>of</strong> the plan by discussing<br />

their roles during an emergency and their responses to a particular<br />

emergency situation. A facilitator initiates the discussion by<br />

presenting a scenario and asking questions based on the scenario.<br />

SOURCE: SP 800-84<br />

Tactical Data – <strong>Information</strong> that requires protection from disclosure and modification<br />

for a limited duration as determined by the originator or information<br />

owner.<br />

SOURCE: CNSSI-4009<br />

Tactical Edge – The platforms, sites, and personnel (U. S. military, allied, coalition<br />

partners, first responders) operating at lethal risk in a battle space or<br />

crisis environment characterized by 1) a dependence on information<br />

systems and connectivity for survival and mission success, 2) high<br />

threats to the operational readiness <strong>of</strong> both information systems and<br />

connectivity, and 3) users are fully engaged, highly stressed, and<br />

dependent on the availability, integrity, and transparency <strong>of</strong> their<br />

information systems.<br />

SOURCE: CNSSI-4009<br />

Tailored <strong>Security</strong> Control Baseline – A set <strong>of</strong> security controls resulting from the application <strong>of</strong> tailoring<br />

guidance to the security control baseline. See Tailoring.<br />

SOURCE: SP 800-37; SP 800-53; SP 800-53A<br />

Tailoring – The process by which a security control baseline is modified based<br />

on: (i) the application <strong>of</strong> scoping guidance; (ii) the specification <strong>of</strong><br />

compensating security controls, if needed; and (iii) the specification<br />

<strong>of</strong> organization-defined parameters in the security controls via<br />

explicit assignment and selection statements.<br />

SOURCE: SP 800-37; SP 800-53; SP 800-53A; CNSSI-4009<br />

Tailoring (Assessment Procedures) – The process by which assessment procedures defined in Special<br />

Publication 800-53A are adjusted, or scoped, to match the<br />

characteristics <strong>of</strong> the information system under assessment, providing<br />

organizations with the flexibility needed to meet specific<br />

organizational requirements and to avoid overly-constrained<br />

assessment approaches.<br />

SOURCE: SP 800-53A<br />

Tampering – An intentional event resulting in modification <strong>of</strong> a system, its<br />

intended behavior, or data.<br />

SOURCE: CNSSI-4009<br />

Pg 189

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!