23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Computer Network Exploitation –<br />

(CNE)<br />

Computer Network Operations –<br />

(CNO)<br />

Enabling operations and intelligence collection capabilities<br />

conducted through the use <strong>of</strong> computer networks to gather data from<br />

target or adversary information systems or networks.<br />

SOURCE: CNSSI-4009<br />

Comprised <strong>of</strong> computer network attack, computer network defense,<br />

and related computer network exploitation enabling operations.<br />

SOURCE: CNSSI-4009<br />

Computer <strong>Security</strong> (COMPUSEC) – Measures and controls that ensure confidentiality, integrity, and<br />

availability <strong>of</strong> information system assets including hardware,<br />

s<strong>of</strong>tware, firmware, and information being processed, stored, and<br />

communicated.<br />

SOURCE: CNSSI-4009<br />

Computer <strong>Security</strong> Incident – See Incident.<br />

Computer <strong>Security</strong> Incident<br />

Response Team (CSIRT) –<br />

Computer <strong>Security</strong> Object (CSO) –<br />

Computer <strong>Security</strong> Objects<br />

Register –<br />

A capability set up for the purpose <strong>of</strong> assisting in responding to<br />

computer security-related incidents; also called a Computer Incident<br />

Response Team (CIRT) or a CIRC (Computer Incident Response<br />

Center, Computer Incident Response Capability).<br />

SOURCE: SP 800-61<br />

A resource, tool, or mechanism used to maintain a condition <strong>of</strong><br />

security in a computerized environment. These objects are defined in<br />

terms <strong>of</strong> attributes they possess, operations they perform or are<br />

performed on them, and their relationship with other objects.<br />

SOURCE: FIPS 188; CNSSI-4009<br />

A collection <strong>of</strong> Computer <strong>Security</strong> Object names and definitions kept<br />

by a registration authority.<br />

SOURCE: FIPS 188; CNSSI-4009<br />

Computer <strong>Security</strong> Subsystem – Hardware/s<strong>of</strong>tware designed to provide computer security features in<br />

a larger system environment.<br />

SOURCE: CNSSI-4009<br />

Computer Virus – See Virus.<br />

Computing Environment – Workstation or server (host) and its operating system, peripherals,<br />

and applications.<br />

SOURCE: CNSSI-4009<br />

COMSEC – Communications <strong>Security</strong>.<br />

SOURCE: CNSSI-4009<br />

Pg 41

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!