NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

csrc.nist.gov
from csrc.nist.gov More from this publisher
23.03.2013 Views

NIST IR 7298 Revision 1, Glossary of Key Information Security Terms Controlled Interface – A boundary with a set of mechanisms that enforces the security policies and controls the flow of information between interconnected information systems. SOURCE: CNSSI-4009; SP 800-37 Controlled Space – Three-dimensional space surrounding information system equipment, within which unauthorized individuals are denied unrestricted access and are either escorted by authorized individuals or are under continuous physical or electronic surveillance. SOURCE: CNSSI-4009 Controlled Unclassified Information (CUI) – A categorical designation that refers to unclassified information that does not meet the standards for National Security Classification under Executive Order 12958, as amended, but is (i) pertinent to the national interests of the United States or to the important interests of entities outside the federal government, and (ii) under law or policy requires protection from unauthorized disclosure, special handling safeguards, or prescribed limits on exchange or dissemination. Henceforth, the designation CUI replaces "Sensitive But Unclassified" (SBU). SOURCE: SP 800-53; SP 800-53A Controlling Authority – Official responsible for directing the operation of a cryptonet and for managing the operational use and control of keying material assigned to the cryptonet. SOURCE: CNSSI-4009 Cookie – A piece of state information supplied by a Web server to a browser, in a response for a requested resource, for the browser to store temporarily and return to the server on any subsequent visits or requests. SOURCE: SP 800-28 Data exchanged between an HTTP server and a browser (a client of the server) to store state information on the client side and retrieve it later for server use. SOURCE: CNSSI-4009 Cooperative Key Generation – Electronically exchanging functions of locally generated, random components, from which both terminals of a secure circuit construct traffic encryption key or key encryption key for use on that circuit. See per-call key. SOURCE: CNSSI-4009 Cooperative Remote Rekeying – Synonymous with manual remote rekeying. SOURCE: CNSSI-4009 Pg 48

NIST IR 7298 Revision 1, Glossary of Key Information Security Terms Correctness Proof – A mathematical proof of consistency between a specification and its implementation. SOURCE: CNSSI-4009 Counter with Cipher Block Chaining-Message Authentication Code (CCM) – A mode of operation for a symmetric key block cipher algorithm. It combines the techniques of the Counter (CTR) mode and the Cipher Block Chaining-Message Authentication Code (CBC-MAC) algorithm to provide assurance of the confidentiality and the authenticity of computer data. SOURCE: SP 800-38C Countermeasure – Actions, devices, procedures, or techniques that meet or oppose (i.e., counters) a threat, a vulnerability, or an attack by eliminating or preventing it, by minimizing the harm it can cause, or by discovering and reporting it so that corrective action can be taken. SOURCE: CNSSI-4009 Countermeasures – Actions, devices, procedures, techniques, or other measures that reduce the vulnerability of an information system. Synonymous with security controls and safeguards. SOURCE: SP 800-53; SP 800-37; FIPS 200 Cover-Coding – A technique to reduce the risks of eavesdropping by obscuring the information that is transmitted. SOURCE: SP 800-98 Coverage – An attribute associated with an assessment method that addresses the scope or breadth of the assessment objects included in the assessment (e.g., types of objects to be assessed and the number of objects to be assessed by type). The values for the coverage attribute, hierarchically from less coverage to more coverage, are basic, focused, and comprehensive. SOURCE: SP 800-53A Covert Channel – An unauthorized communication path that manipulates a communications medium in an unexpected, unconventional, or unforeseen way in order to transmit information without detection by anyone other than the entities operating the covert channel. SOURCE: CNSSI-4009 Covert Channel Analysis – Determination of the extent to which the security policy model and subsequent lower-level program descriptions may allow unauthorized access to information. SOURCE: CNSSI-4009 Pg 49

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Controlled Interface – A boundary with a set <strong>of</strong> mechanisms that enforces the security<br />

policies and controls the flow <strong>of</strong> information between interconnected<br />

information systems.<br />

SOURCE: CNSSI-4009; SP 800-37<br />

Controlled Space – Three-dimensional space surrounding information system equipment,<br />

within which unauthorized individuals are denied unrestricted access<br />

and are either escorted by authorized individuals or are under<br />

continuous physical or electronic surveillance.<br />

SOURCE: CNSSI-4009<br />

Controlled Unclassified <strong>Information</strong><br />

(CUI) –<br />

A categorical designation that refers to unclassified information that<br />

does not meet the standards for National <strong>Security</strong> Classification<br />

under Executive Order 12958, as amended, but is (i) pertinent to the<br />

national interests <strong>of</strong> the United States or to the important interests <strong>of</strong><br />

entities outside the federal government, and (ii) under law or policy<br />

requires protection from unauthorized disclosure, special handling<br />

safeguards, or prescribed limits on exchange or dissemination.<br />

Henceforth, the designation CUI replaces "Sensitive But<br />

Unclassified" (SBU).<br />

SOURCE: SP 800-53; SP 800-53A<br />

Controlling Authority – Official responsible for directing the operation <strong>of</strong> a cryptonet and for<br />

managing the operational use and control <strong>of</strong> keying material assigned<br />

to the cryptonet.<br />

SOURCE: CNSSI-4009<br />

Cookie – A piece <strong>of</strong> state information supplied by a Web server to a browser,<br />

in a response for a requested resource, for the browser to store<br />

temporarily and return to the server on any subsequent visits or<br />

requests.<br />

SOURCE: SP 800-28<br />

Data exchanged between an HTTP server and a browser (a client <strong>of</strong><br />

the server) to store state information on the client side and retrieve it<br />

later for server use.<br />

SOURCE: CNSSI-4009<br />

Cooperative <strong>Key</strong> Generation – Electronically exchanging functions <strong>of</strong> locally generated, random<br />

components, from which both terminals <strong>of</strong> a secure circuit construct<br />

traffic encryption key or key encryption key for use on that circuit.<br />

See per-call key.<br />

SOURCE: CNSSI-4009<br />

Cooperative Remote Rekeying – Synonymous with manual remote rekeying.<br />

SOURCE: CNSSI-4009<br />

Pg 48

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!