NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

csrc.nist.gov
from csrc.nist.gov More from this publisher
23.03.2013 Views

NIST IR 7298 Revision 1, Glossary of Key Information Security Terms Covert Storage Channel – Covert channel involving the direct or indirect writing to a storage location by one process and the direct or indirect reading of the storage location by another process. Covert storage channels typically involve a finite resource (e.g., sectors on a disk) that is shared by two subjects at different security levels. SOURCE: CNSSI-4009 Covert Testing – Testing performed using covert methods and without the knowledge of the organization’s IT staff, but with the full knowledge and permission of upper management. SOURCE: SP 800-115 Covert Timing Channel – Covert channel in which one process signals information to another process by modulating its own use of system resources (e.g., central processing unit time) in such a way that this manipulation affects the real response time observed by the second process. SOURCE: CNSSI-4009 Credential – An object that authoritatively binds an identity (and optionally, additional attributes) to a token possessed and controlled by a person. SOURCE: SP 800-63 Credential – Evidence attesting to one’s right to credit or authority. SOURCE: FIPS 201 Credentials Service Provider – (CSP) Evidence or testimonials that support a claim of identity or assertion of an attribute and usually are intended to be used more than once. SOURCE: CNSSI-4009 A trusted entity that issues or registers subscriber tokens and issues electronic credentials to subscribers. The CSP may encompass Registration Authorities and verifiers that it operates. A CSP may be an independent third party, or may issue credentials for its own use. SOURCE: SP 800-63 Critical Infrastructure – System and assets, whether physical or virtual, so vital to the U.S. that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters. [Critical Infrastructures Protection Act of 2001, 42 U.S.C. 5195c(e)] SOURCE: CNSSI-4009 Pg 50

NIST IR 7298 Revision 1, Glossary of Key Information Security Terms Critical Security Parameter (CSP) – Security-related information (e.g., secret and private cryptographic keys, and authentication data such as passwords and Personal Identification Numbers [PINs]) whose disclosure or modification can compromise the security of a cryptographic module. SOURCE: FIPS 140-2; CNSSI-4009 Criticality – A measure of the degree to which an organization depends on the information or information system for the success of a mission or of a business function. SOURCE: SP 800-60 Criticality Level – Refers to the (consequences of) incorrect behavior of a system. The more serious the expected direct and indirect effects of incorrect behavior, the higher the criticality level. SOURCE: CNSSI-4009 Cross-Certificate – A certificate used to establish a trust relationship between two Certification Authorities. SOURCE: SP 800-32; CNSSI-4009 Cross-Domain Capabilities – The set of functions that enable the transfer of information between security domains in accordance with the policies of the security domains involved. SOURCE: CNSSI-4009 Cross-Domain Solution (CDS) – A form of controlled interface that provides the ability to manually and/or automatically access and/or transfer information between different security domains. SOURCE: CNSSI-4009; SP 800-37 Cryptanalysis – 1) Operations performed in defeating cryptographic protection without an initial knowledge of the key employed in providing the protection. 2) The study of mathematical techniques for attempting to defeat cryptographic techniques and information system security. This includes the process of looking for errors or weaknesses in the implementation of an algorithm or of the algorithm itself. SOURCE: SP 800-57; CNSSI-4009 Crypto Officer – An operator or process (subject), acting on behalf of the operator, performing cryptographic initialization or management functions. SOURCE: FIPS 140-2 Cryptographic – Pertaining to, or concerned with, cryptography. SOURCE: CNSSI-4009 Pg 51

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Covert Storage Channel – Covert channel involving the direct or indirect writing to a storage<br />

location by one process and the direct or indirect reading <strong>of</strong> the<br />

storage location by another process. Covert storage channels<br />

typically involve a finite resource (e.g., sectors on a disk) that is<br />

shared by two subjects at different security levels.<br />

SOURCE: CNSSI-4009<br />

Covert Testing – Testing performed using covert methods and without the knowledge<br />

<strong>of</strong> the organization’s IT staff, but with the full knowledge and<br />

permission <strong>of</strong> upper management.<br />

SOURCE: SP 800-115<br />

Covert Timing Channel – Covert channel in which one process signals information to another<br />

process by modulating its own use <strong>of</strong> system resources (e.g., central<br />

processing unit time) in such a way that this manipulation affects the<br />

real response time observed by the second process.<br />

SOURCE: CNSSI-4009<br />

Credential – An object that authoritatively binds an identity (and optionally,<br />

additional attributes) to a token possessed and controlled by a person.<br />

SOURCE: SP 800-63<br />

Credential – Evidence attesting to one’s right to credit or authority.<br />

SOURCE: FIPS 201<br />

Credentials Service Provider –<br />

(CSP)<br />

Evidence or testimonials that support a claim <strong>of</strong> identity or assertion<br />

<strong>of</strong> an attribute and usually are intended to be used more than once.<br />

SOURCE: CNSSI-4009<br />

A trusted entity that issues or registers subscriber tokens and issues<br />

electronic credentials to subscribers. The CSP may encompass<br />

Registration Authorities and verifiers that it operates. A CSP may be<br />

an independent third party, or may issue credentials for its own use.<br />

SOURCE: SP 800-63<br />

Critical Infrastructure – System and assets, whether physical or virtual, so vital to the U.S.<br />

that the incapacity or destruction <strong>of</strong> such systems and assets would<br />

have a debilitating impact on security, national economic security,<br />

national public health or safety, or any combination <strong>of</strong> those matters.<br />

[Critical Infrastructures Protection Act <strong>of</strong> 2001, 42 U.S.C. 5195c(e)]<br />

SOURCE: CNSSI-4009<br />

Pg 50

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!