23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Certification Practice Statement –<br />

(CPS)<br />

Certification Test and Evaluation –<br />

(CT&E)<br />

Certified TEMPEST Technical<br />

Authority (CTTA) –<br />

A statement <strong>of</strong> the practices that a Certification Authority employs in<br />

issuing, suspending, revoking, and renewing certificates and<br />

providing access to them, in accordance with specific requirements<br />

(i.e., requirements specified in this Certificate Policy, or requirements<br />

specified in a contract for services).<br />

SOURCE: SP 800-32; CNSSI-4009<br />

S<strong>of</strong>tware and hardware security tests conducted during development<br />

<strong>of</strong> an information system.<br />

SOURCE: CNSSI-4009<br />

An experienced, technically qualified U.S. government employee<br />

who has met established certification requirements in accordance<br />

with CNSS-approved criteria and has been appointed by a U.S.<br />

government department or agency to fulfill CTTA responsibilities.<br />

SOURCE: CNSSI-4009<br />

Certifier – Individual responsible for making a technical judgment <strong>of</strong> the<br />

system’s compliance with stated requirements, identifying and<br />

assessing the risks associated with operating the system, coordinating<br />

the certification activities, and consolidating the final certification<br />

and accreditation packages.<br />

SOURCE: CNSSI-4009<br />

Chain <strong>of</strong> Custody – A process that tracks the movement <strong>of</strong> evidence through its<br />

collection, safeguarding, and analysis lifecycle by documenting each<br />

person who handled the evidence, the date/time it was collected or<br />

transferred, and the purpose for the transfer.<br />

SOURCE: SP 800-72; CNSSI-4009<br />

Chain <strong>of</strong> Evidence – A process and record that shows who obtained the evidence; where<br />

and when the evidence was obtained; who secured the evidence; and<br />

who had control or possession <strong>of</strong> the evidence. The “sequencing” <strong>of</strong><br />

the chain <strong>of</strong> evidence follows this order: collection and identification;<br />

analysis; storage; preservation; presentation in court; return to owner.<br />

Challenge and Reply<br />

Authentication –<br />

SOURCE: CNSSI-4009<br />

Prearranged procedure in which a subject requests authentication <strong>of</strong><br />

another and the latter establishes validity with a correct reply.<br />

SOURCE: CNSSI-4009<br />

Pg 29

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!