23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Confidentiality – The property that sensitive information is not disclosed to<br />

unauthorized individuals, entities, or processes.<br />

SOURCE: FIPS 140-2<br />

The property that information is not disclosed to system entities<br />

(users, processes, devices) unless they have been authorized to access<br />

the information.<br />

SOURCE: CNSSI-4009<br />

Configuration Control – Process <strong>of</strong> controlling modifications to hardware, firmware, s<strong>of</strong>tware,<br />

and documentation to protect the information system against<br />

improper modification prior to, during, and after system<br />

implementation.<br />

SOURCE: CNSSI-4009; SP 800-37; SP 800-53<br />

Configuration Control Board –<br />

(CCB)<br />

Confinement Channel – See Covert Channel.<br />

SOURCE: CNSSI-4009<br />

A group <strong>of</strong> qualified people with responsibility for the process <strong>of</strong><br />

regulating and approving changes to hardware, firmware, s<strong>of</strong>tware,<br />

and documentation throughout the development and operational life<br />

cycle <strong>of</strong> an information system.<br />

SOURCE: CNSSI-4009<br />

Container – The file used by a virtual disk encryption technology to encompass<br />

and protect other files.<br />

SOURCE: SP 800-111<br />

Contamination – Type <strong>of</strong> incident involving the introduction <strong>of</strong> data <strong>of</strong> one security<br />

classification or security category into data <strong>of</strong> a lower security<br />

classification or different security category.<br />

SOURCE: CNSSI-4009<br />

Content Filtering – The process <strong>of</strong> monitoring communications such as email and Web<br />

pages, analyzing them for suspicious content, and preventing the<br />

delivery <strong>of</strong> suspicious content to users.<br />

SOURCE: SP 800-114<br />

Contingency <strong>Key</strong> – <strong>Key</strong> held for use under specific operational conditions or in support<br />

<strong>of</strong> specific contingency plans. See reserve keying material.<br />

SOURCE: CNSSI-4009<br />

Pg 45

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!