23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

X.509 Public <strong>Key</strong> Certificate – The public key for a user (or device) and a name for the user (or<br />

device), together with some other information, rendered unforgeable<br />

by the digital signature <strong>of</strong> the certification authority that issued the<br />

certificate, encoded in the format defined in the ISO/ITU-T X.509<br />

standard.<br />

SOURCE: SP 800-57; CNSSI-4009 adapted<br />

Zero Fill – To fill unused storage locations in an information system with the<br />

representation <strong>of</strong> the character denoting "0."<br />

SOURCE: CNSSI-4009<br />

Zeroization – A method <strong>of</strong> erasing electronically stored data, cryptographic keys,<br />

and CSPs by altering or deleting the contents <strong>of</strong> the data storage to<br />

prevent recovery <strong>of</strong> the data.<br />

SOURCE: FIPS 140-2<br />

A method <strong>of</strong> erasing electronically stored data, cryptographic keys,<br />

and Credentials Service Providers (CSPs) by altering or deleting the<br />

contents <strong>of</strong> the data storage to prevent recovery <strong>of</strong> the data.<br />

SOURCE: CNSSI-4009<br />

Zeroize – To remove or eliminate the key from a cryptographic equipment or<br />

fill device.<br />

SOURCE: CNSSI-4009<br />

Zombie – A program that is installed on a system to cause it to attack other<br />

systems.<br />

SOURCE: SP 800-83<br />

Zone Of Control – Three-dimensional space surrounding equipment that processes<br />

classified and/or sensitive information within which TEMPEST<br />

exploitation is not considered practical or where legal authority to<br />

identify and remove a potential TEMPEST exploitation exists.<br />

SOURCE: CNSSI-4009<br />

Pg 209

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!