23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

TSEC Nomenclature – System for identifying the type and purpose <strong>of</strong> certain items <strong>of</strong><br />

COMSEC material.<br />

SOURCE: CNSSI-4009<br />

Tunneled Password Protocol – A protocol where a password is sent through a protected channel. For<br />

example, the TLS protocol is <strong>of</strong>ten used with a verifier’s public key<br />

certificate to (1) authenticate the verifier to the claimant, (2) establish<br />

an encrypted session between the verifier and claimant, and (3)<br />

transmit the claimant’s password to the verifier. The encrypted TLS<br />

session protects the claimant’s password from eavesdroppers.<br />

SOURCE: SP 800-63<br />

Tunneling – Technology enabling one network to send its data via another<br />

network’s connections. Tunneling works by encapsulating a network<br />

protocol within packets carried by the second network.<br />

SOURCE: CNSSI-4009<br />

Two-Part Code – Code consisting <strong>of</strong> an encoding section, in which the vocabulary<br />

items (with their associated code groups) are arranged in alphabetical<br />

or other systematic order, and a decoding section, in which the code<br />

groups (with their associated meanings) are arranged in a separate<br />

alphabetical or numeric order.<br />

SOURCE: CNSSI-4009<br />

Two-Person Control (TPC) – Continuous surveillance and control <strong>of</strong> positive control material at all<br />

times by a minimum <strong>of</strong> two authorized individuals, each capable <strong>of</strong><br />

detecting incorrect and unauthorized procedures with respect to the<br />

task being performed and each familiar with established security and<br />

safety requirements.<br />

SOURCE: CNSSI-4009<br />

Two-Person Integrity (TPI) – System <strong>of</strong> storage and handling designed to prohibit individual access<br />

by requiring the presence <strong>of</strong> at least two authorized individuals, each<br />

capable <strong>of</strong> detecting incorrect or unauthorized security procedures<br />

with respect to the task being performed. See no-lone zone.<br />

SOURCE: CNSSI-4009<br />

Type 1 <strong>Key</strong> – Generated and distributed under the auspices <strong>of</strong> NSA for use in a<br />

cryptographic device for the protection <strong>of</strong> national security<br />

information.<br />

SOURCE: CNSSI-4009, as modified<br />

Pg 199

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!