NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

csrc.nist.gov
from csrc.nist.gov More from this publisher
23.03.2013 Views

NIST IR 7298 Revision 1, Glossary of Key Information Security Terms Valid Data Element – A payload, an associated data string, or a nonce that satisfies the restrictions of the formatting function. SOURCE: SP 800-38C Validation – The process of demonstrating that the system under consideration meets in all respects the specification of that system. SOURCE: FIPS 201 Confirmation (through the provision of strong, sound, objective evidence) that requirements for a specific intended use or application have been fulfilled (e.g., a trustworthy credential has been presented, or data or information has been formatted in accordance with a defined set of rules, or a specific process has demonstrated that an entity under consideration meets, in all respects, its defined attributes or requirements). SOURCE: CNSSI-4009 Variant – One of two or more code symbols having the same plain text equivalent. SOURCE: CNSSI-4009 Verification – Confirmation, through the provision of objective evidence, that specified requirements have been fulfilled (e.g., an entity’s requirements have been correctly defined, or an entity’s attributes have been correctly presented; or a procedure or function performs as intended and leads to the expected outcome). SOURCE: CNSSI-4009 See Also Identity Verification. Verified Name – A subscriber name that has been verified by identity proofing. SOURCE: SP 800-63 Verifier – An entity that verifies the claimant’s identity by verifying the claimant’s possession of a token using an authentication protocol. To do this, the verifier may also need to validate credentials that link the token and identity and check their status. SOURCE: SP 800-63 Verifier – An entity which is or represents the entity requiring an authenticated identity. A verifier includes the functions necessary for engaging in authentication exchanges. SOURCE: FIPS 196 Pg 204

NIST IR 7298 Revision 1, Glossary of Key Information Security Terms Verifier Impersonation Attack – An attack where the attacker impersonates the verifier in an authentication protocol, usually to learn a password. SOURCE: SP 800-63 Victim – A machine that is attacked. SOURCE: SP 800-61 Virtual Machine (VM) – Software that allows a single host to run one or more guest operating systems. SOURCE: SP 800-115 Virtual Private Network (VPN) – A virtual network, built on top of existing physical networks, that provides a secure communications tunnel for data and other information transmitted between networks. SOURCE: SP 800-46 Protected information system link utilizing tunneling, security controls (see Information Assurance), and endpoint address translation giving the impression of a dedicated line SOURCE: CNSSI-4009 Virus – A self-replicating program that runs and spreads by modifying other programs or files. SOURCE: SP 800-61 A computer program that can copy itself and infect a computer without permission or knowledge of the user. A virus might corrupt or delete data on a computer, use email programs to spread itself to other computers, or even erase everything on a hard disk. SOURCE: CNSSI-4009 Virus Hoax – An urgent warning message about a nonexistent virus. SOURCE: SP 800-61 Vulnerability – Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source. SOURCE: SP 800-53; SP 800-53A; SP 800-37; SP 800-60; SP 800- 115; FIPS 200 A weakness in a system, application, or network that is subject to exploitation or misuse. SOURCE: SP 800-61 Pg 205

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Verifier Impersonation Attack – An attack where the attacker impersonates the verifier in an<br />

authentication protocol, usually to learn a password.<br />

SOURCE: SP 800-63<br />

Victim – A machine that is attacked.<br />

SOURCE: SP 800-61<br />

Virtual Machine (VM) – S<strong>of</strong>tware that allows a single host to run one or more guest operating<br />

systems.<br />

SOURCE: SP 800-115<br />

Virtual Private Network (VPN) –<br />

A virtual network, built on top <strong>of</strong> existing physical networks, that<br />

provides a secure communications tunnel for data and other<br />

information transmitted between networks.<br />

SOURCE: SP 800-46<br />

Protected information system link utilizing tunneling, security<br />

controls (see <strong>Information</strong> Assurance), and endpoint address<br />

translation giving the impression <strong>of</strong> a dedicated line<br />

SOURCE: CNSSI-4009<br />

Virus – A self-replicating program that runs and spreads by modifying other<br />

programs or files.<br />

SOURCE: SP 800-61<br />

A computer program that can copy itself and infect a computer<br />

without permission or knowledge <strong>of</strong> the user. A virus might corrupt<br />

or delete data on a computer, use email programs to spread itself to<br />

other computers, or even erase everything on a hard disk.<br />

SOURCE: CNSSI-4009<br />

Virus Hoax – An urgent warning message about a nonexistent virus.<br />

SOURCE: SP 800-61<br />

Vulnerability –<br />

Weakness in an information system, system security procedures,<br />

internal controls, or implementation that could be exploited or<br />

triggered by a threat source.<br />

SOURCE: SP 800-53; SP 800-53A; SP 800-37; SP 800-60; SP 800-<br />

115; FIPS 200<br />

A weakness in a system, application, or network that is subject to<br />

exploitation or misuse.<br />

SOURCE: SP 800-61<br />

Pg 205

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!