23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Threat Analysis – The examination <strong>of</strong> threat sources against system vulnerabilities to<br />

determine the threats for a particular system in a particular<br />

operational environment.<br />

SOURCE: SP 800-27<br />

Threat Assessment –<br />

See Threat Assessment.<br />

SOURCE: CNSSI-4009<br />

Formal description and evaluation <strong>of</strong> threat to an information system.<br />

SOURCE: SP 800-53; SP 800-18<br />

Process <strong>of</strong> formally evaluating the degree <strong>of</strong> threat to an information<br />

system or enterprise and describing the nature <strong>of</strong> the threat.<br />

SOURCE: CNSSI-4009; SP 800-53A<br />

Threat Monitoring – Analysis, assessment, and review <strong>of</strong> audit trails and other information<br />

collected for the purpose <strong>of</strong> searching out system events that may<br />

constitute violations <strong>of</strong> system security.<br />

SOURCE: CNSSI-4009<br />

Threat Source – The intent and method targeted at the intentional exploitation <strong>of</strong> a<br />

vulnerability or a situation and method that may accidentally trigger a<br />

vulnerability. Synonymous with Threat Agent.<br />

SOURCE: FIPS 200; SP 800-53; SP 800-53A; SP 800-37<br />

The intent and method targeted at the intentional exploitation <strong>of</strong> a<br />

vulnerability or a situation and method that may accidentally exploit<br />

a vulnerability.<br />

SOURCE: CNSSI-4009<br />

Time Bomb – Resident computer program that triggers an unauthorized act at a<br />

predefined time.<br />

SOURCE: CNSSI-4009<br />

Time-Compliance Date – Date by which a mandatory modification to a COMSEC end-item<br />

must be incorporated if the item is to remain approved for operational<br />

use.<br />

SOURCE: CNSSI-4009<br />

Time-Dependent Password – Password that is valid only at a certain time <strong>of</strong> day or during a<br />

specified interval <strong>of</strong> time.<br />

SOURCE: CNSSI-4009<br />

Pg 192

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!