23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Web Risk Assessment – Processes for ensuring Web sites are in compliance with applicable<br />

policies.<br />

SOURCE: CNSSI-4009<br />

White Team – 1. The group responsible for refereeing an engagement between a<br />

Red Team <strong>of</strong> mock attackers and a Blue Team <strong>of</strong> actual defenders <strong>of</strong><br />

their enterprise’s use <strong>of</strong> information systems. In an exercise, the<br />

White Team acts as the judges, enforces the rules <strong>of</strong> the exercise,<br />

observes the exercise, scores teams, resolves any problems that may<br />

arise, handles all requests for information or questions, and ensures<br />

that the competition runs fairly and does not cause operational<br />

problems for the defender's mission. The White Team helps to<br />

establish the rules <strong>of</strong> engagement, the metrics for assessing results<br />

and the procedures for providing operational security for the<br />

engagement. The White Team normally has responsibility for<br />

deriving lessons-learned, conducting the post engagement<br />

assessment, and promulgating results.<br />

2. Can also refer to a small group <strong>of</strong> people who have prior<br />

knowledge <strong>of</strong> unannounced Red Team activities. The White Team<br />

acts as observers during the Red Team activity and ensures the scope<br />

<strong>of</strong> testing does not exceed a predefined threshold.<br />

SOURCE: CNSSI-4009<br />

Wi-Fi Protected Access-2 (WPA2) – The approved Wi-Fi Alliance interoperable implementation <strong>of</strong> the<br />

IEEE 802.11i security standard. For federal government use, the<br />

implementation must use FIPS-approved encryption, such as AES.<br />

SOURCE: CNSSI-4009<br />

Wiki – Web applications or similar tools that allow identifiable users to add<br />

content (as in an Internet forum) and allow anyone to edit that<br />

content collectively.<br />

SOURCE: CNSSI-4009<br />

Wired Equivalent Privacy (WEP) –<br />

A security protocol, specified in the IEEE 802.11 standard, that is<br />

designed to provide a WLAN with a level <strong>of</strong> security and privacy<br />

comparable to what is usually expected <strong>of</strong> a wired LAN. WEP is no<br />

longer considered a viable encryption mechanism due to known<br />

weaknesses.<br />

SOURCE: SP 800-48<br />

Wireless Access Point (WAP) – A device that acts as a conduit to connect wireless communication<br />

devices together to allow them to communicate and create a wireless<br />

network.<br />

SOURCE: CNSSI-4009<br />

Pg 207

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!