23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

TEMPEST – A name referring to the investigation, study, and control <strong>of</strong><br />

compromising emanations from telecommunications and automated<br />

information systems equipment.<br />

SOURCE: CNSSI-4009<br />

TEMPEST Test – Laboratory or on-site test to determine the nature <strong>of</strong> compromising<br />

emanations associated with an information system.<br />

SOURCE: CNSSI-4009<br />

TEMPEST Zone – Designated area within a facility where equipment with appropriate<br />

TEMPEST characteristics (TEMPEST zone assignment) may be<br />

operated.<br />

SOURCE: CNSSI-4009<br />

Test – A type <strong>of</strong> assessment method that is characterized by the process <strong>of</strong><br />

exercising one or more assessment objects under specified conditions<br />

to compare actual with expected behavior, the results <strong>of</strong> which are<br />

used to support the determination <strong>of</strong> security control effectiveness<br />

over time.<br />

SOURCE: SP 800-53A<br />

Test <strong>Key</strong> – <strong>Key</strong> intended for testing <strong>of</strong> COMSEC equipment or systems.<br />

SOURCE: CNSSI-4009<br />

Threat –<br />

Any circumstance or event with the potential to adversely impact<br />

organizational operations (including mission, functions, image, or<br />

reputation), organizational assets, individuals, other organizations, or<br />

the Nation through an information system via unauthorized access,<br />

destruction, disclosure, modification <strong>of</strong> information, and/or denial <strong>of</strong><br />

service.<br />

SOURCE: SP 800-53; SP 800-53A; SP 800-27; SP 800-60; SP 800-<br />

37; CNSSI-4009<br />

The potential source <strong>of</strong> an adverse event.<br />

SOURCE: SP 800-61<br />

Threat – Any circumstance or event with the potential to adversely impact<br />

organizational operations (including mission, functions, image, or<br />

reputation), organizational assets, or individuals through an<br />

information system via unauthorized access, destruction, disclosure,<br />

modification <strong>of</strong> information, and/or denial <strong>of</strong> service. Also, the<br />

potential for a threat-source to successfully exploit a particular<br />

information system vulnerability.<br />

SOURCE: FIPS 200<br />

Pg 191

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!