23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Cryptography – Is categorized as either secret key or public key. Secret key<br />

cryptography is based on the use <strong>of</strong> a single cryptographic key shared<br />

between two parties. The same key is used to encrypt and decrypt<br />

data. This key is kept secret by the two parties. Public key<br />

cryptography is a form <strong>of</strong> cryptography which makes use <strong>of</strong> two<br />

keys: a public key and a private key. The two keys are related but<br />

have the property that, given the public key, it is computationally<br />

infeasible to derive the private key [FIPS 140-1]. In a public key<br />

cryptosystem, each party has its own public/private key pair. The<br />

public key can be known by anyone; the private key is kept secret.<br />

SOURCE: FIPS 191<br />

Art or science concerning the principles, means, and methods for<br />

rendering plain information unintelligible and for restoring encrypted<br />

information to intelligible form.<br />

SOURCE: CNSSI-4009<br />

Cryptology – The science that deals with hidden, disguised, or encrypted<br />

communications. It includes communications security and<br />

communications intelligence.<br />

SOURCE: SP 800-60<br />

The mathematical science that deals with cryptanalysis and<br />

cryptography.<br />

SOURCE: CNSSI-4009<br />

CVE – See Common Vulnerabilities and Exposures.<br />

Cyber Attack – An attack, via cyberspace, targeting an enterprise’s use <strong>of</strong> cyberspace<br />

for the purpose <strong>of</strong> disrupting, disabling, destroying, or maliciously<br />

controlling a computing environment/infrastructure; or destroying the<br />

integrity <strong>of</strong> the data or stealing controlled information.<br />

SOURCE: CNSSI-4009<br />

Cyber Incident – Actions taken through the use <strong>of</strong> computer networks that result in an<br />

actual or potentially adverse effect on an information system and/or<br />

the information residing therein. See incident.<br />

SOURCE: CNSSI-4009<br />

Pg 56

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!