23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Correctness Pro<strong>of</strong> – A mathematical pro<strong>of</strong> <strong>of</strong> consistency between a specification and its<br />

implementation.<br />

SOURCE: CNSSI-4009<br />

Counter with Cipher Block<br />

Chaining-Message<br />

Authentication Code (CCM) –<br />

A mode <strong>of</strong> operation for a symmetric key block cipher algorithm. It<br />

combines the techniques <strong>of</strong> the Counter (CTR) mode and the Cipher<br />

Block Chaining-Message Authentication Code (CBC-MAC)<br />

algorithm to provide assurance <strong>of</strong> the confidentiality and the<br />

authenticity <strong>of</strong> computer data.<br />

SOURCE: SP 800-38C<br />

Countermeasure – Actions, devices, procedures, or techniques that meet or oppose (i.e.,<br />

counters) a threat, a vulnerability, or an attack by eliminating or<br />

preventing it, by minimizing the harm it can cause, or by discovering<br />

and reporting it so that corrective action can be taken.<br />

SOURCE: CNSSI-4009<br />

Countermeasures – Actions, devices, procedures, techniques, or other measures that<br />

reduce the vulnerability <strong>of</strong> an information system. Synonymous with<br />

security controls and safeguards.<br />

SOURCE: SP 800-53; SP 800-37; FIPS 200<br />

Cover-Coding – A technique to reduce the risks <strong>of</strong> eavesdropping by obscuring the<br />

information that is transmitted.<br />

SOURCE: SP 800-98<br />

Coverage – An attribute associated with an assessment method that addresses the<br />

scope or breadth <strong>of</strong> the assessment objects included in the assessment<br />

(e.g., types <strong>of</strong> objects to be assessed and the number <strong>of</strong> objects to be<br />

assessed by type). The values for the coverage attribute,<br />

hierarchically from less coverage to more coverage, are basic,<br />

focused, and comprehensive.<br />

SOURCE: SP 800-53A<br />

Covert Channel – An unauthorized communication path that manipulates a<br />

communications medium in an unexpected, unconventional, or<br />

unforeseen way in order to transmit information without detection by<br />

anyone other than the entities operating the covert channel.<br />

SOURCE: CNSSI-4009<br />

Covert Channel Analysis – Determination <strong>of</strong> the extent to which the security policy model and<br />

subsequent lower-level program descriptions may allow unauthorized<br />

access to information.<br />

SOURCE: CNSSI-4009<br />

Pg 49

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!