23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

An environment or context that includes a set <strong>of</strong> system resources<br />

and a set <strong>of</strong> system entities that have the right to access the resources<br />

as defined by a common security policy, security model, or security<br />

architecture. See <strong>Security</strong> Domain.<br />

SOURCE: CNSSI-4009; SP 800-53; SP 800-37<br />

Drop Accountability – Procedure under which a COMSEC account custodian initially<br />

receipts for COMSEC material, and provides no further accounting<br />

for it to its central <strong>of</strong>fice <strong>of</strong> record. Local accountability <strong>of</strong> the<br />

COMSEC material may continue to be required. See accounting<br />

legend code.<br />

SOURCE: CNSSI-4009<br />

Dual-Use Certificate – A certificate that is intended for use with both digital signature and<br />

data encryption services.<br />

SOURCE: SP 800-32<br />

Due Care – The responsibility that managers and their organizations have a duty<br />

to provide for information security to ensure that the type <strong>of</strong> control,<br />

the cost <strong>of</strong> control, and the deployment <strong>of</strong> control are appropriate for<br />

the system being managed.<br />

SOURCE: SP 800-30<br />

Duplicate Digital Evidence – A duplicate is an accurate digital reproduction <strong>of</strong> all data objects<br />

contained on the original physical item and associated media.<br />

SOURCE: SP 800-72<br />

Duration – A field within a certificate that is composed <strong>of</strong> two subfields; “date <strong>of</strong><br />

issue” and “date <strong>of</strong> next issue.”<br />

SOURCE: SP 800-32<br />

Dynamic Subsystem – A subsystem that is not continually present during the execution<br />

phase <strong>of</strong> an information system. Service-oriented architectures<br />

and cloud computing architectures are examples <strong>of</strong> architectures<br />

that employ dynamic subsystems.<br />

SOURCE: SP 800-37<br />

E-Government (e-gov) – The use by the U.S. government <strong>of</strong> Web-based Internet applications<br />

and other information technology.<br />

SOURCE: CNSSI-4009<br />

Pg 65

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!