23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Target Of Evaluation (TOE) – In accordance with Common Criteria, an information system, part <strong>of</strong><br />

a system or product, and all associated documentation, that is the<br />

subject <strong>of</strong> a security evaluation.<br />

SOURCE: CNSSI-4009<br />

Technical Controls –<br />

The security controls (i.e., safeguards or countermeasures) for an<br />

information system that are primarily implemented and executed by<br />

the information system through mechanisms contained in the<br />

hardware, s<strong>of</strong>tware, or firmware components <strong>of</strong> the system.<br />

SOURCE: SP 800-53; SP 800-53A; SP 800-37; FIPS 200<br />

Technical Non-repudiation – The contribution <strong>of</strong> public key mechanisms to the provision <strong>of</strong><br />

technical evidence supporting a non-repudiation security service.<br />

SOURCE: SP 800-32<br />

Technical Reference Model(TRM) –<br />

Technical <strong>Security</strong> Controls –<br />

Technical Vulnerability<br />

<strong>Information</strong> –<br />

A component-driven, technical framework that categorizes the<br />

standards and technologies to support and enable the delivery <strong>of</strong><br />

service components and capabilities.<br />

SOURCE: CNSSI-4009<br />

<strong>Security</strong> controls (i.e., safeguards or countermeasures) for an<br />

information system that are primarily implemented and executed by<br />

the information system through mechanisms contained in the<br />

hardware, s<strong>of</strong>tware, or firmware components <strong>of</strong> the system.<br />

SOURCE: CNSSI-4009<br />

Detailed description <strong>of</strong> a weakness to include the implementable<br />

steps (such as code) necessary to exploit that weakness.<br />

SOURCE: CNSSI-4009<br />

Telecommunications – Preparation, transmission, communication, or related processing <strong>of</strong><br />

information (writing, images, sounds, or other data) by electrical,<br />

electromagnetic, electromechanical, electro-optical, or electronic<br />

means.<br />

SOURCE: CNSSI-4009<br />

Telework – The ability for an organization’s employees and contractors to<br />

perform work from locations other than the organization’s facilities.<br />

SOURCE: SP 800-46<br />

Tempest – A name referring to the investigation, study, and control <strong>of</strong><br />

unintentional compromising emanations from telecommunications<br />

and automated information systems equipment.<br />

SOURCE: FIPS 140-2<br />

Pg 190

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!