23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Critical <strong>Security</strong> Parameter (CSP) – <strong>Security</strong>-related information (e.g., secret and private cryptographic<br />

keys, and authentication data such as passwords and Personal<br />

Identification Numbers [PINs]) whose disclosure or modification can<br />

compromise the security <strong>of</strong> a cryptographic module.<br />

SOURCE: FIPS 140-2; CNSSI-4009<br />

Criticality – A measure <strong>of</strong> the degree to which an organization depends on the<br />

information or information system for the success <strong>of</strong> a mission or<br />

<strong>of</strong> a business function.<br />

SOURCE: SP 800-60<br />

Criticality Level – Refers to the (consequences <strong>of</strong>) incorrect behavior <strong>of</strong> a system. The<br />

more serious the expected direct and indirect effects <strong>of</strong> incorrect<br />

behavior, the higher the criticality level.<br />

SOURCE: CNSSI-4009<br />

Cross-Certificate – A certificate used to establish a trust relationship between two<br />

Certification Authorities.<br />

SOURCE: SP 800-32; CNSSI-4009<br />

Cross-Domain Capabilities – The set <strong>of</strong> functions that enable the transfer <strong>of</strong> information between<br />

security domains in accordance with the policies <strong>of</strong> the security<br />

domains involved.<br />

SOURCE: CNSSI-4009<br />

Cross-Domain Solution (CDS) – A form <strong>of</strong> controlled interface that provides the ability to manually<br />

and/or automatically access and/or transfer information between<br />

different security domains.<br />

SOURCE: CNSSI-4009; SP 800-37<br />

Cryptanalysis – 1) Operations performed in defeating cryptographic protection<br />

without an initial knowledge <strong>of</strong> the key employed in providing the<br />

protection.<br />

2) The study <strong>of</strong> mathematical techniques for attempting to defeat<br />

cryptographic techniques and information system security. This<br />

includes the process <strong>of</strong> looking for errors or weaknesses in the<br />

implementation <strong>of</strong> an algorithm or <strong>of</strong> the algorithm itself.<br />

SOURCE: SP 800-57; CNSSI-4009<br />

Crypto Officer – An operator or process (subject), acting on behalf <strong>of</strong> the operator,<br />

performing cryptographic initialization or management functions.<br />

SOURCE: FIPS 140-2<br />

Cryptographic – Pertaining to, or concerned with, cryptography.<br />

SOURCE: CNSSI-4009<br />

Pg 51

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!