23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

The result <strong>of</strong> a cryptographic transformation <strong>of</strong> data that, when<br />

properly implemented, provides a mechanism for verifying origin<br />

authentication, data integrity, and signatory non-repudiation.<br />

SOURCE: FIPS 186<br />

The result <strong>of</strong> a cryptographic transformation <strong>of</strong> data that, when<br />

properly implemented, provides origin authentication, data integrity,<br />

and signatory non-repudiation.<br />

SOURCE: SP 800-89<br />

Cryptographic process used to assure data object originator<br />

authenticity, data integrity, and time stamping for prevention <strong>of</strong><br />

replay.<br />

SOURCE: CNSSI-4009<br />

Digital Signature Algorithm – Asymmetric algorithms used for digitally signing data.<br />

SOURCE: SP 800-49<br />

Direct Shipment – Shipment <strong>of</strong> COMSEC material directly from NSA to user COMSEC<br />

accounts.<br />

SOURCE: CNSSI-4009<br />

Disaster Recovery Plan (DRP) –<br />

A written plan for recovering one or more information systems at an<br />

alternate facility in response to a major hardware or s<strong>of</strong>tware failure<br />

or destruction <strong>of</strong> facilities.<br />

SOURCE: SP 800-34<br />

Management policy and procedures used to guide an enterprise<br />

response to a major loss <strong>of</strong> enterprise capability or damage to its<br />

facilities. The DRP is the second plan needed by the enterprise risk<br />

managers and is used when the enterprise must recover (at its original<br />

facilities) from a loss <strong>of</strong> capability over a period <strong>of</strong> hours or days.<br />

See Continuity <strong>of</strong> Operations Plan and Contingency Plan.<br />

SOURCE: CNSSI-4009<br />

Disconnection – The termination <strong>of</strong> an interconnection between two or more IT<br />

systems. A disconnection may be planned (e.g., due to changed<br />

business needs) or unplanned (i.e., due to an attack or other<br />

contingency).<br />

SOURCE: SP 800-47<br />

Discretionary Access Control – The basis <strong>of</strong> this kind <strong>of</strong> security is that an individual user, or<br />

program operating on the user’s behalf, is allowed to specify<br />

explicitly the types <strong>of</strong> access other users (or programs executing on<br />

their behalf) may have to information under the user’s control.<br />

SOURCE: FIPS 191<br />

Pg 63

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!