NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

csrc.nist.gov
from csrc.nist.gov More from this publisher
23.03.2013 Views

NIST IR 7298 Revision 1, Glossary of Key Information Security Terms Disclosure of information to unauthorized persons, or a violation of the security policy of a system in which unauthorized intentional or unintentional disclosure, modification, destruction, or loss of an object may have occurred. SOURCE: CNSSI-4009 Compromising Emanations – Unintentional signals that, if intercepted and analyzed, would disclose the information transmitted, received, handled, or otherwise processed by information systems equipment. See TEMPEST. SOURCE: CNSSI-4009 Computer Abuse – Intentional or reckless misuse, alteration, disruption, or destruction of information processing resources. SOURCE: CNSSI-4009 Computer Cryptography – Use of a crypto-algorithm program by a computer to authenticate or encrypt/decrypt information. SOURCE: CNSSI-4009 Computer Forensics – The practice of gathering, retaining, and analyzing computer-related data for investigative purposes in a manner that maintains the integrity of the data. SOURCE: SP 800-61; CNSSI-4009 Computer Incident Response Team – (CIRT) Group of individuals usually consisting of Security Analysts organized to develop, recommend, and coordinate immediate mitigation actions for containment, eradication, and recovery resulting from computer security incidents. Also called a Computer Security Incident Response Team (CSIRT) or a CIRC (Computer Incident Response Center, Computer Incident Response Capability, or Cyber Incident Response Team). SOURCE: CNSSI-4009 Computer Network Attack (CNA) – Actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves. SOURCE: CNSSI-4009 Computer Network Defense(CND) – Actions taken to defend against unauthorized activity within computer networks. CND includes monitoring, detection, analysis (such as trend and pattern analysis), and response and restoration activities. SOURCE: CNSSI-4009 Pg 40

NIST IR 7298 Revision 1, Glossary of Key Information Security Terms Computer Network Exploitation – (CNE) Computer Network Operations – (CNO) Enabling operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversary information systems or networks. SOURCE: CNSSI-4009 Comprised of computer network attack, computer network defense, and related computer network exploitation enabling operations. SOURCE: CNSSI-4009 Computer Security (COMPUSEC) – Measures and controls that ensure confidentiality, integrity, and availability of information system assets including hardware, software, firmware, and information being processed, stored, and communicated. SOURCE: CNSSI-4009 Computer Security Incident – See Incident. Computer Security Incident Response Team (CSIRT) – Computer Security Object (CSO) – Computer Security Objects Register – A capability set up for the purpose of assisting in responding to computer security-related incidents; also called a Computer Incident Response Team (CIRT) or a CIRC (Computer Incident Response Center, Computer Incident Response Capability). SOURCE: SP 800-61 A resource, tool, or mechanism used to maintain a condition of security in a computerized environment. These objects are defined in terms of attributes they possess, operations they perform or are performed on them, and their relationship with other objects. SOURCE: FIPS 188; CNSSI-4009 A collection of Computer Security Object names and definitions kept by a registration authority. SOURCE: FIPS 188; CNSSI-4009 Computer Security Subsystem – Hardware/software designed to provide computer security features in a larger system environment. SOURCE: CNSSI-4009 Computer Virus – See Virus. Computing Environment – Workstation or server (host) and its operating system, peripherals, and applications. SOURCE: CNSSI-4009 COMSEC – Communications Security. SOURCE: CNSSI-4009 Pg 41

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Disclosure <strong>of</strong> information to unauthorized persons, or a violation <strong>of</strong><br />

the security policy <strong>of</strong> a system in which unauthorized intentional or<br />

unintentional disclosure, modification, destruction, or loss <strong>of</strong> an<br />

object may have occurred.<br />

SOURCE: CNSSI-4009<br />

Compromising Emanations – Unintentional signals that, if intercepted and analyzed, would<br />

disclose the information transmitted, received, handled, or otherwise<br />

processed by information systems equipment. See TEMPEST.<br />

SOURCE: CNSSI-4009<br />

Computer Abuse – Intentional or reckless misuse, alteration, disruption, or destruction <strong>of</strong><br />

information processing resources.<br />

SOURCE: CNSSI-4009<br />

Computer Cryptography – Use <strong>of</strong> a crypto-algorithm program by a computer to authenticate or<br />

encrypt/decrypt information.<br />

SOURCE: CNSSI-4009<br />

Computer Forensics – The practice <strong>of</strong> gathering, retaining, and analyzing computer-related<br />

data for investigative purposes in a manner that maintains the<br />

integrity <strong>of</strong> the data.<br />

SOURCE: SP 800-61; CNSSI-4009<br />

Computer Incident Response Team –<br />

(CIRT)<br />

Group <strong>of</strong> individuals usually consisting <strong>of</strong> <strong>Security</strong> Analysts<br />

organized to develop, recommend, and coordinate immediate<br />

mitigation actions for containment, eradication, and recovery<br />

resulting from computer security incidents. Also called a Computer<br />

<strong>Security</strong> Incident Response Team (CSIRT) or a CIRC (Computer<br />

Incident Response Center, Computer Incident Response Capability,<br />

or Cyber Incident Response Team).<br />

SOURCE: CNSSI-4009<br />

Computer Network Attack (CNA) – Actions taken through the use <strong>of</strong> computer networks to disrupt, deny,<br />

degrade, or destroy information resident in computers and computer<br />

networks, or the computers and networks themselves.<br />

SOURCE: CNSSI-4009<br />

Computer Network Defense(CND) – Actions taken to defend against unauthorized activity within<br />

computer networks. CND includes monitoring, detection, analysis<br />

(such as trend and pattern analysis), and response and restoration<br />

activities.<br />

SOURCE: CNSSI-4009<br />

Pg 40

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!