23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Trusted Platform Module (TPM)<br />

Chip –<br />

A tamper-resistant integrated circuit built into some computer<br />

motherboards that can perform cryptographic operations (including<br />

key generation) and protect small amounts <strong>of</strong> sensitive information,<br />

such as passwords and cryptographic keys.<br />

SOURCE: SP 800-111<br />

Trusted Process – Process that has been tested and verified to operate only as intended.<br />

SOURCE: CNSSI-4009<br />

Trusted Recovery – Ability to ensure recovery without compromise after a system failure.<br />

SOURCE: CNSSI-4009<br />

Trusted S<strong>of</strong>tware – S<strong>of</strong>tware portion <strong>of</strong> a trusted computing base (TCB).<br />

SOURCE: CNSSI-4009<br />

Trusted Timestamp – A digitally signed assertion by a trusted authority that a specific<br />

digital object existed at a particular time.<br />

SOURCE: SP 800-32; CNSSI-4009<br />

Trustworthiness – The attribute <strong>of</strong> a person or organization that provides confidence to<br />

others <strong>of</strong> the qualifications, capabilities, and reliability <strong>of</strong> that entity<br />

to perform specific tasks and fulfill assigned responsibilities.<br />

SOURCE: SP 800-79<br />

The attribute <strong>of</strong> a person or enterprise that provides confidence to<br />

others <strong>of</strong> the qualifications, capabilities, and reliability <strong>of</strong> that entity<br />

to perform specific tasks and fulfill assigned responsibilities.<br />

SOURCE: CNSSI-4009<br />

<strong>Security</strong> decisions with respect to extended investigations to<br />

determine and confirm qualifications, and suitability to perform<br />

specific tasks and responsibilities.<br />

SOURCE: FIPS 201<br />

Trustworthy System – Computer hardware, s<strong>of</strong>tware and procedures that—<br />

1) are reasonably secure from intrusion and misuse;<br />

2) provide a reasonable level <strong>of</strong> availability, reliability, and correct<br />

operation;<br />

3) are reasonably suited to performing their intended functions; and<br />

4) adhere to generally accepted security procedures.<br />

SOURCE: SP 800-32<br />

TSEC – Telecommunications <strong>Security</strong>.<br />

SOURCE: CNSSI-4009<br />

Pg 198

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!