23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Easter Egg – Hidden functionality within an application program, which becomes<br />

activated when an undocumented, and <strong>of</strong>ten convoluted, set <strong>of</strong><br />

commands and keystrokes are entered. Easter eggs are typically used<br />

to display the credits for the development team and are intended to be<br />

nonthreatening.<br />

SOURCE: SP 800-28<br />

Education (<strong>Information</strong> <strong>Security</strong>) – Education integrates all <strong>of</strong> the security skills and competencies <strong>of</strong> the<br />

various functional specialties into a common body <strong>of</strong> knowledge . . .<br />

and strives to produce IT security specialists and pr<strong>of</strong>essionals<br />

capable <strong>of</strong> vision and proactive response.<br />

SOURCE: SP 800-50<br />

Egress Filtering – Filtering <strong>of</strong> outgoing network traffic.<br />

SOURCE: SP 800-41<br />

Electronic Authentication –<br />

(E-authentication)<br />

Electronic Business (e-business) – Doing business online.<br />

SOURCE: CNSSI-4009<br />

The process <strong>of</strong> blocking outgoing packets that use obviously false<br />

Internet Protocol (IP) addresses, such as source addresses from<br />

internal networks.<br />

SOURCE: SP 800-61<br />

The process <strong>of</strong> establishing confidence in user identities<br />

electronically presented to an information system.<br />

SOURCE: SP 800-63; CNSSI-4009<br />

Electronic Credentials – Digital documents used in authentication that bind an identity or an<br />

attribute to a subscriber's token.<br />

SOURCE: SP 800-63; CNSSI-4009<br />

Electronic Evidence – <strong>Information</strong> and data <strong>of</strong> investigative value that is stored on or<br />

transmitted by an electronic device.<br />

SOURCE: SP 800-72<br />

Electronic <strong>Key</strong> Entry – The entry <strong>of</strong> cryptographic keys into a cryptographic module using<br />

electronic methods such as a smart card or a key-loading device. (The<br />

operator <strong>of</strong> the key may have no knowledge <strong>of</strong> the value <strong>of</strong> the key<br />

being entered.)<br />

SOURCE: FIPS 140-2<br />

Pg 66

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!