23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Dedicated Mode – <strong>Information</strong> systems security mode <strong>of</strong> operation wherein each user,<br />

with direct or indirect access to the system, its peripherals, remote<br />

terminals, or remote hosts, has all <strong>of</strong> the following: 1. valid security<br />

clearance for all information within the system, 2. formal access<br />

approval and signed nondisclosure agreements for all the information<br />

stored and/or processed (including all compartments,<br />

subcompartments, and/or special access programs), and 3. valid needto-know<br />

for all information contained within the information system.<br />

When in the dedicated security mode, a system is specifically and<br />

exclusively dedicated to and controlled for the processing <strong>of</strong> one<br />

particular type or classification <strong>of</strong> information, either for full-time<br />

operation or for a specified period <strong>of</strong> time.<br />

SOURCE: CNSSI-4009<br />

Default Classification – Classification reflecting the highest classification being processed in<br />

an information system. Default classification is included in the<br />

caution statement affixed to an object.<br />

SOURCE: CNSSI-4009<br />

Defense-in-Breadth – A planned, systematic set <strong>of</strong> multidisciplinary activities that seek to<br />

identify, manage, and reduce risk <strong>of</strong> exploitable vulnerabilities at<br />

every stage <strong>of</strong> the system, network, or sub-component life cycle<br />

(system, network, or product design and development;<br />

manufacturing; packaging; assembly; system integration;<br />

distribution; operations; maintenance; and retirement).<br />

SOURCE: CNSSI-4009<br />

Defense-in-Depth – <strong>Information</strong> security strategy integrating people, technology, and<br />

operations capabilities to establish variable barriers across multiple<br />

layers and dimensions <strong>of</strong> the organization.<br />

SOURCE: CNSSI-4009; SP 800-53<br />

Degauss – Procedure that reduces the magnetic flux to virtual zero by applying a<br />

reverse magnetizing field. Also called demagnetizing.<br />

SOURCE: CNSSI-4009<br />

Delegated Development Program – INFOSEC program in which the Director, NSA, delegates, on a caseby-case<br />

basis, the development and/or production <strong>of</strong> an entire<br />

telecommunications product, including the INFOSEC portion, to a<br />

lead department or agency.<br />

SOURCE: CNSSI-4009<br />

Deleted File – A file that has been logically, but not necessarily physically, erased<br />

from the operating system, perhaps to eliminate potentially<br />

incriminating evidence. Deleting files does not always necessarily<br />

eliminate the possibility <strong>of</strong> recovering all or part <strong>of</strong> the original data.<br />

SOURCE: SP 800-72<br />

Pg 60

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!