23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Certificate-Related <strong>Information</strong> – <strong>Information</strong>, such as a subscriber's postal address, that is not included<br />

in a certificate. May be used by a Certification Authority (CA)<br />

managing certificates.<br />

SOURCE: SP 800-32<br />

Certificate Revocation List (CRL) –<br />

Data, such as a subscriber's postal address that is not included in a<br />

certificate. May be used by a Certification Authority (CA) managing<br />

certificates.<br />

SOURCE: CNSSI-4009<br />

A list <strong>of</strong> revoked public key certificates created and digitally signed<br />

by a Certification Authority.<br />

SOURCE: SP 800-63; FIPS 201<br />

Certificate Revocation List – A list <strong>of</strong> revoked but un-expired certificates issued by a CA.<br />

SOURCE: SP 800-21<br />

A list <strong>of</strong> revoked public key certificates created and digitally signed<br />

by a Certification Authority.<br />

SOURCE: CNSSI-4009<br />

Certificate Status Authority – A trusted entity that provides online verification to a Relying Party <strong>of</strong><br />

a subject certificate's trustworthiness, and may also provide<br />

additional attribute information for the subject certificate.<br />

SOURCE: SP 800-32; CNSSI-4009<br />

Certification – A comprehensive assessment <strong>of</strong> the management, operational, and<br />

technical security controls in an information system, made in support<br />

<strong>of</strong> security accreditation, to determine the extent to which the<br />

controls are implemented correctly, operating as intended, and<br />

producing the desired outcome with respect to meeting the security<br />

requirements for the system.<br />

SOURCE: FIPS 200<br />

Certification – The process <strong>of</strong> verifying the correctness <strong>of</strong> a statement or claim and<br />

issuing a certificate as to its correctness.<br />

SOURCE: FIPS 201<br />

Comprehensive evaluation <strong>of</strong> the technical and nontechnical security<br />

safeguards <strong>of</strong> an information system to support the accreditation<br />

process that establishes the extent to which a particular design and<br />

implementation meets a set <strong>of</strong> specified security requirements. See<br />

security control assessment.<br />

SOURCE: CNSSI-4009<br />

Pg 27

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!