23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Demilitarized Zone (DMZ) –<br />

Denial <strong>of</strong> Service (DoS) –<br />

An interface on a routing firewall that is similar to the interfaces<br />

found on the firewall’s protected side. Traffic moving between the<br />

DMZ and other interfaces on the protected side <strong>of</strong> the firewall still<br />

goes through the firewall and can have firewall protection policies<br />

applied.<br />

SOURCE: SP 800-41<br />

A host or network segment inserted as a “neutral zone” between an<br />

organization’s private network and the Internet.<br />

SOURCE: SP 800-45<br />

Perimeter network segment that is logically between internal and<br />

external networks. Its purpose is to enforce the internal network’s<br />

<strong>Information</strong> Assurance policy for external information exchange and<br />

to provide external, untrusted sources with restricted access to<br />

releasable information while shielding the internal networks from<br />

outside attacks.<br />

SOURCE: CNSSI-4009<br />

An attack that prevents or impairs the authorized use <strong>of</strong> networks,<br />

systems, or applications by exhausting resources.<br />

SOURCE: SP 800-61<br />

The prevention <strong>of</strong> authorized access to resources or the delaying <strong>of</strong><br />

time-critical operations. (Time-critical may be milliseconds or it may<br />

be hours, depending upon the service provided.)<br />

SOURCE: CNSSI-4009<br />

Depth – An attribute associated with an assessment method that addresses the<br />

rigor and level <strong>of</strong> detail associated with the application <strong>of</strong> the<br />

method. The values for the depth attribute, hierarchically from less<br />

depth to more depth, are basic, focused, and comprehensive.<br />

SOURCE: SP 800-53A<br />

Descriptive Top-Level<br />

Specification (DTLS) –<br />

Designated Approval Authority –<br />

(DAA)<br />

Designated Approving<br />

(Accrediting) Authority –<br />

A natural language descriptive <strong>of</strong> a system’s security requirements,<br />

an informal design notation, or a combination <strong>of</strong> the two.<br />

SOURCE: CNSSI-4009<br />

Official with the authority to formally assume responsibility for<br />

operating a system at an acceptable level <strong>of</strong> risk. This term is<br />

synonymous with authorizing <strong>of</strong>ficial, designated accrediting<br />

authority, and delegated accrediting authority.<br />

SOURCE: CNSSI-4009<br />

See Authorizing Official<br />

Pg 61

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!