23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Bit Error Rate – Ratio between the number <strong>of</strong> bits incorrectly received and the total<br />

number <strong>of</strong> bits transmitted in a telecommunications system.<br />

SOURCE: CNSSI-4009<br />

BLACK – Designation applied to encrypted information and the information<br />

systems, the associated areas, circuits, components, and equipment<br />

processing that information. See also RED.<br />

SOURCE: CNSSI-4009<br />

Black Box Testing – See Basic Testing.<br />

Black Core – A communication network architecture in which user data traversing<br />

a global Internet Protocol (IP) network is end-to-end encrypted at the<br />

IP layer. Related to striped core.<br />

SOURCE: CNSSI-4009<br />

Blacklist – A list <strong>of</strong> email senders who have previously sent span to a user.<br />

SOURCE: SP 800-114<br />

A list <strong>of</strong> discrete entities, such as hosts or applications, that have been<br />

previously determined to be associated with malicious activity.<br />

SOURCE: SP 800-94<br />

Blacklisting – The process <strong>of</strong> the system invalidating a user ID based on the user’s<br />

inappropriate actions. A blacklisted user ID cannot be used to log on<br />

to the system, even with the correct authenticator. Blacklisting and<br />

lifting <strong>of</strong> a blacklisting are both security-relevant events.<br />

Blacklisting also applies to blocks placed against IP addresses to<br />

prevent inappropriate or unauthorized use <strong>of</strong> Internet resources.<br />

SOURCE: CNSSI-4009<br />

Blended Attack – Malicious code that uses multiple methods to spread.<br />

SOURCE: SP 800-61<br />

A hostile action to spread malicious code via multiple methods.<br />

SOURCE: CNSSI-4009<br />

Blinding – Generating network traffic that is likely to trigger many alerts in a<br />

short period <strong>of</strong> time, to conceal alerts triggered by a “real” attack<br />

performed simultaneously.<br />

SOURCE: SP 800-94<br />

Pg 21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!