NISTIR 7298 Revision 1, Glossary of Key Information Security Terms
NISTIR 7298 Revision 1, Glossary of Key Information Security Terms NISTIR 7298 Revision 1, Glossary of Key Information Security Terms
NIST IR 7298 Revision 1, Glossary of Key Information Security Terms Valid Data Element – A payload, an associated data string, or a nonce that satisfies the restrictions of the formatting function. SOURCE: SP 800-38C Validation – The process of demonstrating that the system under consideration meets in all respects the specification of that system. SOURCE: FIPS 201 Confirmation (through the provision of strong, sound, objective evidence) that requirements for a specific intended use or application have been fulfilled (e.g., a trustworthy credential has been presented, or data or information has been formatted in accordance with a defined set of rules, or a specific process has demonstrated that an entity under consideration meets, in all respects, its defined attributes or requirements). SOURCE: CNSSI-4009 Variant – One of two or more code symbols having the same plain text equivalent. SOURCE: CNSSI-4009 Verification – Confirmation, through the provision of objective evidence, that specified requirements have been fulfilled (e.g., an entity’s requirements have been correctly defined, or an entity’s attributes have been correctly presented; or a procedure or function performs as intended and leads to the expected outcome). SOURCE: CNSSI-4009 See Also Identity Verification. Verified Name – A subscriber name that has been verified by identity proofing. SOURCE: SP 800-63 Verifier – An entity that verifies the claimant’s identity by verifying the claimant’s possession of a token using an authentication protocol. To do this, the verifier may also need to validate credentials that link the token and identity and check their status. SOURCE: SP 800-63 Verifier – An entity which is or represents the entity requiring an authenticated identity. A verifier includes the functions necessary for engaging in authentication exchanges. SOURCE: FIPS 196 Pg 204
NIST IR 7298 Revision 1, Glossary of Key Information Security Terms Verifier Impersonation Attack – An attack where the attacker impersonates the verifier in an authentication protocol, usually to learn a password. SOURCE: SP 800-63 Victim – A machine that is attacked. SOURCE: SP 800-61 Virtual Machine (VM) – Software that allows a single host to run one or more guest operating systems. SOURCE: SP 800-115 Virtual Private Network (VPN) – A virtual network, built on top of existing physical networks, that provides a secure communications tunnel for data and other information transmitted between networks. SOURCE: SP 800-46 Protected information system link utilizing tunneling, security controls (see Information Assurance), and endpoint address translation giving the impression of a dedicated line SOURCE: CNSSI-4009 Virus – A self-replicating program that runs and spreads by modifying other programs or files. SOURCE: SP 800-61 A computer program that can copy itself and infect a computer without permission or knowledge of the user. A virus might corrupt or delete data on a computer, use email programs to spread itself to other computers, or even erase everything on a hard disk. SOURCE: CNSSI-4009 Virus Hoax – An urgent warning message about a nonexistent virus. SOURCE: SP 800-61 Vulnerability – Weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source. SOURCE: SP 800-53; SP 800-53A; SP 800-37; SP 800-60; SP 800- 115; FIPS 200 A weakness in a system, application, or network that is subject to exploitation or misuse. SOURCE: SP 800-61 Pg 205
- Page 154 and 155: NIST IR 7298 Revision 1, Glossary o
- Page 156 and 157: NIST IR 7298 Revision 1, Glossary o
- Page 158 and 159: NIST IR 7298 Revision 1, Glossary o
- Page 160 and 161: NIST IR 7298 Revision 1, Glossary o
- Page 162 and 163: NIST IR 7298 Revision 1, Glossary o
- Page 164 and 165: NIST IR 7298 Revision 1, Glossary o
- Page 166 and 167: NIST IR 7298 Revision 1, Glossary o
- Page 168 and 169: NIST IR 7298 Revision 1, Glossary o
- Page 170 and 171: NIST IR 7298 Revision 1, Glossary o
- Page 172 and 173: NIST IR 7298 Revision 1, Glossary o
- Page 174 and 175: NIST IR 7298 Revision 1, Glossary o
- Page 176 and 177: NIST IR 7298 Revision 1, Glossary o
- Page 178 and 179: NIST IR 7298 Revision 1, Glossary o
- Page 180 and 181: NIST IR 7298 Revision 1, Glossary o
- Page 182 and 183: NIST IR 7298 Revision 1, Glossary o
- Page 184 and 185: NIST IR 7298 Revision 1, Glossary o
- Page 186 and 187: NIST IR 7298 Revision 1, Glossary o
- Page 188 and 189: NIST IR 7298 Revision 1, Glossary o
- Page 190 and 191: NIST IR 7298 Revision 1, Glossary o
- Page 192 and 193: NIST IR 7298 Revision 1, Glossary o
- Page 194 and 195: NIST IR 7298 Revision 1, Glossary o
- Page 196 and 197: NIST IR 7298 Revision 1, Glossary o
- Page 198 and 199: NIST IR 7298 Revision 1, Glossary o
- Page 200 and 201: NIST IR 7298 Revision 1, Glossary o
- Page 202 and 203: NIST IR 7298 Revision 1, Glossary o
- Page 206 and 207: NIST IR 7298 Revision 1, Glossary o
- Page 208 and 209: NIST IR 7298 Revision 1, Glossary o
- Page 210 and 211: NIST IR 7298, Glossary of Key Infor
NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />
Verifier Impersonation Attack – An attack where the attacker impersonates the verifier in an<br />
authentication protocol, usually to learn a password.<br />
SOURCE: SP 800-63<br />
Victim – A machine that is attacked.<br />
SOURCE: SP 800-61<br />
Virtual Machine (VM) – S<strong>of</strong>tware that allows a single host to run one or more guest operating<br />
systems.<br />
SOURCE: SP 800-115<br />
Virtual Private Network (VPN) –<br />
A virtual network, built on top <strong>of</strong> existing physical networks, that<br />
provides a secure communications tunnel for data and other<br />
information transmitted between networks.<br />
SOURCE: SP 800-46<br />
Protected information system link utilizing tunneling, security<br />
controls (see <strong>Information</strong> Assurance), and endpoint address<br />
translation giving the impression <strong>of</strong> a dedicated line<br />
SOURCE: CNSSI-4009<br />
Virus – A self-replicating program that runs and spreads by modifying other<br />
programs or files.<br />
SOURCE: SP 800-61<br />
A computer program that can copy itself and infect a computer<br />
without permission or knowledge <strong>of</strong> the user. A virus might corrupt<br />
or delete data on a computer, use email programs to spread itself to<br />
other computers, or even erase everything on a hard disk.<br />
SOURCE: CNSSI-4009<br />
Virus Hoax – An urgent warning message about a nonexistent virus.<br />
SOURCE: SP 800-61<br />
Vulnerability –<br />
Weakness in an information system, system security procedures,<br />
internal controls, or implementation that could be exploited or<br />
triggered by a threat source.<br />
SOURCE: SP 800-53; SP 800-53A; SP 800-37; SP 800-60; SP 800-<br />
115; FIPS 200<br />
A weakness in a system, application, or network that is subject to<br />
exploitation or misuse.<br />
SOURCE: SP 800-61<br />
Pg 205