23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Trojan Horse – A non-self-replicating program that seems to have a useful purpose,<br />

but in reality has a different, malicious purpose.<br />

SOURCE: SP 800-61<br />

A computer program that appears to have a useful function, but<br />

also has a hidden and potentially malicious function that evades<br />

security mechanisms, sometimes by exploiting legitimate<br />

authorizations <strong>of</strong> a system entity that invokes the program.<br />

SOURCE: CNSSI-4009<br />

Trust Anchor – A public key and the name <strong>of</strong> a certification authority that is used to<br />

validate the first certificate in a sequence <strong>of</strong> certificates. The trust<br />

anchor public key is used to verify the signature on a certificate<br />

issued by a trust anchor certification authority. The security <strong>of</strong> the<br />

validation process depends upon the authenticity and integrity <strong>of</strong> the<br />

trust anchor. Trust anchors are <strong>of</strong>ten distributed as self-signed<br />

certificates.<br />

SOURCE: SP 800-57<br />

An established point <strong>of</strong> trust (usually based on the authority <strong>of</strong> some<br />

person, <strong>of</strong>fice, or organization) from which an entity begins the<br />

validation <strong>of</strong> an authorized process or authorized (signed) package.<br />

A "trust anchor" is sometimes defined as just a public key used for<br />

different purposes (e.g., validating a Certification Authority,<br />

validating a signed s<strong>of</strong>tware package or key, validating the process<br />

[or person] loading the signed s<strong>of</strong>tware or key).<br />

SOURCE: CNSSI-4009<br />

Trust List – The collection <strong>of</strong> trusted certificates used by Relying Parties to<br />

authenticate other certificates.<br />

SOURCE: SP 800-32; CNSSI-4009<br />

Trusted Agent – Entity authorized to act as a representative <strong>of</strong> an agency in<br />

confirming Subscriber identification during the registration process.<br />

Trusted Agents do not have automated interfaces with Certification<br />

Authorities.<br />

SOURCE: SP 800-32; CNSSI-4009<br />

Trusted Certificate – A certificate that is trusted by the Relying Party on the basis <strong>of</strong> secure<br />

and authenticated delivery. The public keys included in trusted<br />

certificates are used to start certification paths. Also known as a<br />

"trust anchor."<br />

SOURCE: SP 800-32; CNSSI-4009<br />

Pg 196

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!