23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

TOE <strong>Security</strong> Functions (TSF) – Set consisting <strong>of</strong> all hardware, s<strong>of</strong>tware, and firmware <strong>of</strong> the TOE<br />

that must be relied upon for the correct enforcement <strong>of</strong> the TOE<br />

<strong>Security</strong> Policy (TSP).<br />

SOURCE: CNSSI-4009<br />

TOE <strong>Security</strong> Policy (TSP) – Set <strong>of</strong> rules that regulate how assets are managed, protected, and<br />

distributed within the TOE.<br />

SOURCE: CNSSI-4009<br />

Token – Something that the claimant possesses and controls (typically a key<br />

or password) used to authenticate the claimant’s identity.<br />

SOURCE: SP 800-63<br />

Something that the claimant possesses and controls (such as a key or<br />

password) that is used to authenticate a claim. See also<br />

cryptographic token.<br />

SOURCE: CNSSI-4009<br />

Total Risk – The potential for the occurrence <strong>of</strong> an adverse event if no mitigating<br />

action is taken (i.e., the potential for any applicable threat to exploit a<br />

system vulnerability).<br />

SOURCE: SP 800-16<br />

Tracking Cookie – A cookie placed on a user’s computer to track the user’s activity on<br />

different Web sites, creating a detailed pr<strong>of</strong>ile <strong>of</strong> the user’s behavior.<br />

SOURCE: SP 800-83<br />

Tradecraft Identity – An identity used for the purpose <strong>of</strong> work-related interactions that<br />

may or may not be synonymous with an individual’s true identity.<br />

SOURCE: CNSSI-4009<br />

Traditional INFOSEC Program – Program in which NSA acts as the central procurement agency for<br />

the development and, in some cases, the production <strong>of</strong> INFOSEC<br />

items. This includes the Authorized Vendor Program. Modifications<br />

to the INFOSEC end-items used in products developed and/or<br />

produced under these programs must be approved by NSA.<br />

SOURCE: CNSSI-4009<br />

Traffic Analysis – A form <strong>of</strong> passive attack in which an intruder observes information<br />

about calls (although not necessarily the contents <strong>of</strong> the messages)<br />

and makes inferences, e.g., from the source and destination numbers,<br />

or frequency and length <strong>of</strong> the messages.<br />

SOURCE: SP 800-24<br />

Pg 193

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!