23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Buffer Overflow – A condition at an interface under which more input can be placed<br />

into a buffer or data holding area than the capacity allocated,<br />

overwriting other information. Attackers exploit such a condition to<br />

crash a system or to insert specially crafted code that allows them to<br />

gain control <strong>of</strong> the system.<br />

SOURCE: SP 800-28; CNSSI-4009<br />

Buffer Overflow Attack – A method <strong>of</strong> overloading a predefined amount <strong>of</strong> space in a buffer,<br />

which can potentially overwrite and corrupt data in memory.<br />

SOURCE: SP 800-72<br />

Bulk Encryption – Simultaneous encryption <strong>of</strong> all channels <strong>of</strong> a multichannel<br />

telecommunications link.<br />

SOURCE: CNSSI-4009<br />

Business Continuity Plan (BCP) –<br />

Business Impact Analysis (BIA) –<br />

The documentation <strong>of</strong> a predetermined set <strong>of</strong> instructions or<br />

procedures that describe how an organization’s mission/business<br />

functions will be sustained during and after a significant disruption.<br />

SOURCE: SP 800-34<br />

The documentation <strong>of</strong> a predetermined set <strong>of</strong> instructions or<br />

procedures that describe how an organization’s business functions<br />

will be sustained during and after a significant disruption.<br />

SOURCE: CNSSI-4009<br />

An analysis <strong>of</strong> an information system’s requirements, functions, and<br />

interdependencies used to characterize system contingency<br />

requirements and priorities in the event <strong>of</strong> a significant disruption.<br />

SOURCE: SP 800-34<br />

An analysis <strong>of</strong> an enterprise’s requirements, processes, and<br />

interdependencies used to characterize information system<br />

contingency requirements and priorities in the event <strong>of</strong> a significant<br />

disruption.<br />

SOURCE: CNSSI-4009<br />

Call Back – Procedure for identifying and authenticating a remote information<br />

system terminal, whereby the host system disconnects the terminal<br />

and reestablishes contact.<br />

SOURCE: CNSSI-4009<br />

Canister – Type <strong>of</strong> protective package used to contain and dispense keying<br />

material in punched or printed tape form.<br />

SOURCE: CNSSI-4009<br />

Pg 24

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!