23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Accreditation – See Authorization.<br />

Accreditation Authority – See Authorizing Official.<br />

Accreditation Boundary – See Authorization Boundary.<br />

Accreditation Package – Product comprised <strong>of</strong> a System <strong>Security</strong> Plan (SSP) and a report<br />

documenting the basis for the accreditation decision.<br />

SOURCE: CNSSI-4009<br />

Accrediting Authority – Synonymous with Designated Accrediting Authority (DAA). See<br />

also Authorizing Official.<br />

SOURCE: CNSSI-4009<br />

Activation Data – Private data, other than keys, that are required to access<br />

cryptographic modules.<br />

SOURCE: SP 800-32<br />

Active Attack – An attack that alters a system or data.<br />

SOURCE: CNSSI-4009<br />

Active Content – Electronic documents that can carry out or trigger actions<br />

automatically on a computer platform without the intervention <strong>of</strong> a<br />

user.<br />

SOURCE: SP 800-28<br />

S<strong>of</strong>tware in various forms that is able to automatically carry out or<br />

trigger actions on a computer platform without the intervention <strong>of</strong> a<br />

user.<br />

SOURCE: CNSSI-4009<br />

Active <strong>Security</strong> Testing – <strong>Security</strong> testing that involves direct interaction with a target, such as<br />

sending packets to a target.<br />

SOURCE: SP 800-115<br />

Activities – An assessment object that includes specific protection-related<br />

pursuits or actions supporting an information system that involve<br />

people (e.g., conducting system backup operations, monitoring<br />

network traffic).<br />

SOURCE: SP 800-53A<br />

Add-on <strong>Security</strong> – Incorporation <strong>of</strong> new hardware, s<strong>of</strong>tware, or firmware safeguards in<br />

an operational information system.<br />

SOURCE: CNSSI-4009<br />

Pg 6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!