23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Vulnerability Analysis – See Vulnerability Assessment.<br />

Vulnerability Assessment –<br />

Weakness in an information system, system security procedures,<br />

internal controls, or implementation that could be exploited by a<br />

threat source.<br />

SOURCE: CNSSI-4009<br />

Formal description and evaluation <strong>of</strong> the vulnerabilities in an<br />

information system.<br />

SOURCE: SP 800-53; SP 800-37<br />

Systematic examination <strong>of</strong> an information system or product to<br />

determine the adequacy <strong>of</strong> security measures, identify security<br />

deficiencies, provide data from which to predict the effectiveness <strong>of</strong><br />

proposed security measures, and confirm the adequacy <strong>of</strong> such<br />

measures after implementation.<br />

SOURCE: SP 800-53A; CNSSI-4009<br />

Warm Site – An environmentally conditioned workspace that is partially equipped<br />

with information systems and telecommunications equipment to<br />

support relocated operations in the event <strong>of</strong> a significant disruption.<br />

SOURCE: SP 800-34<br />

Backup site which typically contains the data links and preconfigured<br />

equipment necessary to rapidly start operations, but does not contain<br />

live data. Thus commencing operations at a warm site will (at a<br />

minimum) require the restoration <strong>of</strong> current data.<br />

SOURCE: CNSSI-4009<br />

Web Bug – A tiny image, invisible to a user, placed on Web pages in such a way<br />

to enable third parties to track use <strong>of</strong> Web servers and collect<br />

information about the user, including IP address, host name, browser<br />

type and version, operating system name and version, and cookies.<br />

SOURCE: SP 800-28<br />

Malicious code, invisible to a user, placed on Web sites in such a way<br />

that it allows third parties to track use <strong>of</strong> Web servers and collect<br />

information about the user, including IP address, host name, browser<br />

type and version, operating system name and version, and Web<br />

browser cookie.<br />

SOURCE: CNSSI-4009<br />

Web Content Filtering S<strong>of</strong>tware – A program that prevents access to undesirable Web sites, typically by<br />

comparing a requested Web site address to a list <strong>of</strong> known bad Web<br />

sites.<br />

SOURCE: SP 800-69<br />

Pg 206

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!