23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

User – Individual or (system) process authorized to access an information<br />

system.<br />

SOURCE: FIPS 200<br />

Individual, or (system) process acting on behalf <strong>of</strong> an individual,<br />

authorized to access an information system.<br />

SOURCE: SP 800-53; SP 800-18; CNSSI-4009<br />

User – An individual or a process (subject) acting on behalf <strong>of</strong> the individual<br />

that accesses a cryptographic module in order to obtain cryptographic<br />

services.<br />

SOURCE: FIPS 140-2<br />

User ID – Unique symbol or character string used by an information system to<br />

identify a specific user.<br />

SOURCE: CNSSI-4009<br />

User Initialization – A function in the life cycle <strong>of</strong> keying material; the process whereby a<br />

user initializes its cryptographic application (e.g., installing and<br />

initializing s<strong>of</strong>tware and hardware).<br />

SOURCE: SP 800-57<br />

User Partnership Program (UPP) – Partnership between the NSA and a U.S. government agency to<br />

facilitate development <strong>of</strong> secure information system equipment<br />

incorporating NSA-approved cryptography. The result <strong>of</strong> this<br />

program is the authorization <strong>of</strong> the product or system to safeguard<br />

national security information in the user’s specific application.<br />

SOURCE: CNSSI-4009<br />

User Registration – A function in the life cycle <strong>of</strong> keying material; a process whereby an<br />

entity becomes a member <strong>of</strong> a security domain.<br />

SOURCE: SP 800-57<br />

User Representative (COMSEC) – Individual authorized by an organization to order COMSEC keying<br />

material and interface with the keying system, provide information to<br />

key users, and ensure the correct type <strong>of</strong> key is ordered.<br />

SOURCE: CNSSI-4009<br />

User Representative (Risk<br />

Management) –<br />

The person that defines the system’s operational and functional<br />

requirements, and who is responsible for ensuring that user<br />

operational interests are met throughout the systems authorization<br />

process.<br />

SOURCE: CNSSI-4009<br />

Pg 203

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!