23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

The analysis <strong>of</strong> patterns in communications for the purpose <strong>of</strong><br />

gaining intelligence about a system or its users. It does not require<br />

examination <strong>of</strong> the content <strong>of</strong> the communications, which may or<br />

may not be decipherable. For example, an adversary may be able to<br />

detect a signal from a reader that could enable it to infer that a<br />

particular activity is occurring (e.g., a shipment has arrived, someone<br />

is entering a facility) without necessarily learning an identifier or<br />

associated data.<br />

SOURCE: SP 800-98<br />

Gaining knowledge <strong>of</strong> information by inference from observable<br />

characteristics <strong>of</strong> a data flow, even if the information is not directly<br />

available (e.g., when the data is encrypted). These characteristics<br />

include the identities and locations <strong>of</strong> the source(s) and destination(s)<br />

<strong>of</strong> the flow, and the flow's presence, amount, frequency, and duration<br />

<strong>of</strong> occurrence.<br />

SOURCE: CNSSI-4009<br />

Traffic Encryption <strong>Key</strong> (TEK) – <strong>Key</strong> used to encrypt plain text or to superencrypt previously<br />

encrypted text and/or to decrypt cipher text.<br />

SOURCE: CNSSI-4009<br />

Traffic Padding – Generation <strong>of</strong> mock communications or data units to disguise the<br />

amount <strong>of</strong> real data units being sent.<br />

SOURCE: CNSSI-4009<br />

Traffic-Flow <strong>Security</strong> (TFS) – Techniques to counter Traffic Analysis.<br />

SOURCE: CNSSI-4009<br />

Training (<strong>Information</strong> <strong>Security</strong>) – Training strives to produce relevant and needed (information)<br />

security skills and competencies.<br />

SOURCE: SP 800-50<br />

Training Assessment – An evaluation <strong>of</strong> the training efforts.<br />

SOURCE: SP 800-16<br />

Training Effectiveness – A measurement <strong>of</strong> what a given student has learned from a specific<br />

course or training event.<br />

SOURCE: SP 800-16<br />

Pg 194

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!