23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Device Distribution Pr<strong>of</strong>ile – An approval-based Access Control List (ACL) for a specific product<br />

that 1) names the user devices in a specific key management<br />

infrastructure (KMI) Operating Account (KOA) to which PRSNs<br />

distribute the product, and 2) states conditions <strong>of</strong> distribution for each<br />

device.<br />

SOURCE: CNSSI-4009<br />

Device Registration Manager – The management role that is responsible for performing activities<br />

related to registering users that are devices.<br />

SOURCE: CNSSI-4009<br />

Dial Back – Synonymous with call back.<br />

SOURCE: CNSSI-4009<br />

Differential Power Analysis –<br />

(DPA)<br />

An analysis <strong>of</strong> the variations <strong>of</strong> the electrical power consumption <strong>of</strong> a<br />

cryptographic module, using advanced statistical methods and/or<br />

other techniques, for the purpose <strong>of</strong> extracting information correlated<br />

to cryptographic keys used in a cryptographic algorithm.<br />

SOURCE: FIPS 140-2<br />

Digital Evidence – Electronic information stored or transferred in digital form.<br />

SOURCE: SP 800-72<br />

Digital Forensics – The application <strong>of</strong> science to the identification, collection,<br />

examination, and analysis <strong>of</strong> data while preserving the integrity <strong>of</strong> the<br />

information and maintaining a strict chain <strong>of</strong> custody for the data.<br />

SOURCE: SP 800-86<br />

Digital Signature – An asymmetric key operation where the private key is used to<br />

digitally sign an electronic document and the public key is used to<br />

verify the signature. Digital signatures provide authentication and<br />

integrity protection.<br />

SOURCE: SP 800-63<br />

Digital Signature – A nonforgeable transformation <strong>of</strong> data that allows the pro<strong>of</strong> <strong>of</strong> the<br />

source (with non-repudiation) and the verification <strong>of</strong> the integrity <strong>of</strong><br />

that data.<br />

SOURCE: FIPS 196<br />

Digital Signature – The result <strong>of</strong> a cryptographic transformation <strong>of</strong> data which, when<br />

properly implemented, provides the services <strong>of</strong>:<br />

1. origin authentication,<br />

2. data integrity, and<br />

3. signer non-repudiation.<br />

SOURCE: FIPS 140-2<br />

Pg 62

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!