23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Data <strong>Security</strong> – Protection <strong>of</strong> data from unauthorized (accidental or intentional)<br />

modification, destruction, or disclosure.<br />

SOURCE: CNSSI-4009<br />

Data Transfer Device (DTD) – Fill device designed to securely store, transport, and transfer<br />

electronically both COMSEC and TRANSEC key, designed to be<br />

backward compatible with the previous generation <strong>of</strong> COMSEC<br />

common fill devices, and programmable to support modern mission<br />

systems.<br />

SOURCE: CNSSI-4009<br />

Decertification – Revocation <strong>of</strong> the certification <strong>of</strong> an information system item or<br />

equipment for cause.<br />

SOURCE: CNSSI-4009<br />

Decipher – Convert enciphered text to plain text by means <strong>of</strong> a cryptographic<br />

system.<br />

SOURCE: CNSSI-4009<br />

Decode – Convert encoded text to plain text by means <strong>of</strong> a code.<br />

SOURCE: CNSSI-4009<br />

Decrypt – Generic term encompassing decode and decipher.<br />

SOURCE: CNSSI-4009<br />

Decryption – The process <strong>of</strong> transforming ciphertext into plaintext.<br />

SOURCE: SP 800-67<br />

Decryption – The process <strong>of</strong> changing ciphertext into plaintext using a<br />

cryptographic algorithm and key.<br />

SOURCE: SP 800-21<br />

Decryption – Conversion <strong>of</strong> ciphertext to plaintext through the use<br />

<strong>of</strong> a cryptographic algorithm.<br />

SOURCE: FIPS 185<br />

Pg 59

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!