23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Type 4 Product – Unevaluated commercial cryptographic equipment, assemblies, or<br />

components that neither NSA nor NIST certify for any government<br />

usage. These products are typically delivered as part <strong>of</strong> commercial<br />

<strong>of</strong>ferings and are commensurate with the vendor’s commercial<br />

practices. These products may contain either vendor proprietary<br />

algorithms, algorithms registered by NIST, or algorithms registered<br />

by NIST and published in a FIPS.<br />

SOURCE: CNSSI-4009<br />

Type Accreditation – A form <strong>of</strong> accreditation that is used to authorize multiple instances <strong>of</strong><br />

a major application or general support system for operation at<br />

approved locations with the same type <strong>of</strong> computing environment. In<br />

situations where a major application or general support system is<br />

installed at multiple locations, a type accreditation will satisfy C&A<br />

requirements only if the application or system consists <strong>of</strong> a common<br />

set <strong>of</strong> tested and approved hardware, s<strong>of</strong>tware, and firmware.<br />

SOURCE: CNSSI-4009<br />

Type Certification – The certification acceptance <strong>of</strong> replica information systems based on<br />

the comprehensive evaluation <strong>of</strong> the technical and nontechnical<br />

security features <strong>of</strong> an information system and other safeguards,<br />

made as part <strong>of</strong> and in support <strong>of</strong> the formal approval process, to<br />

establish the extent to which a particular design and implementation<br />

meet a specified set <strong>of</strong> security requirements.<br />

SOURCE: CNSSI-4009<br />

U.S. Person – Federal law and Executive Order define a U.S. Person as: a citizen <strong>of</strong><br />

the United States; an alien lawfully admitted for permanent<br />

residence; an unincorporated association with a substantial number <strong>of</strong><br />

members who are citizens <strong>of</strong> the U.S. or are aliens lawfully admitted<br />

for permanent residence; and/or a corporation that is incorporated in<br />

the U.S.<br />

SOURCE: CNSSI-4009<br />

U.S.-Controlled Facility – Base or building to which access is physically controlled by U.S.<br />

individuals who are authorized U.S. government or U.S. government<br />

contractor employees.<br />

SOURCE: CNSSI-4009<br />

U.S.-Controlled Space – Room or floor within a facility that is not a U.S.-controlled facility,<br />

access to which is physically controlled by U.S. individuals who are<br />

authorized U.S. government or U.S. government contractor<br />

employees. <strong>Key</strong>s or combinations to locks controlling entrance to<br />

U.S.-controlled spaces must be under the exclusive control <strong>of</strong> U.S.<br />

individuals who are U.S. government or U.S. government contractor<br />

employees.<br />

SOURCE: CNSSI-4009<br />

Pg 201

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!