23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Electronic <strong>Key</strong> Management System<br />

(EKMS) –<br />

Interoperable collection <strong>of</strong> systems being developed by services and<br />

agencies <strong>of</strong> the U.S. government to automate the planning, ordering,<br />

generating, distributing, storing, filling, using, and destroying <strong>of</strong><br />

electronic key and management <strong>of</strong> other types <strong>of</strong> COMSEC material.<br />

SOURCE: CNSSI-4009<br />

Electronic Messaging Services – Services providing interpersonal messaging capability; meeting<br />

specific functional, management, and technical requirements; and<br />

yielding a business-quality electronic mail service suitable for the<br />

conduct <strong>of</strong> <strong>of</strong>ficial government business.<br />

SOURCE: CNSSI-4009<br />

Electronic Signature – The process <strong>of</strong> applying any mark in electronic form with the intent<br />

to sign a data object. See also digital signature.<br />

SOURCE: CNSSI-4009<br />

Electronically Generated <strong>Key</strong> – <strong>Key</strong> generated in a COMSEC device by introducing (either<br />

mechanically or electronically) a seed key into the device and then<br />

using the seed, together with a s<strong>of</strong>tware algorithm stored in the<br />

device, to produce the desired key.<br />

SOURCE: CNSSI-4009<br />

Emanations <strong>Security</strong> (EMSEC) – Protection resulting from measures taken to deny unauthorized<br />

individuals information derived from intercept and analysis <strong>of</strong><br />

compromising emissions from crypto-equipment or an information<br />

system. See TEMPEST.<br />

SOURCE: CNSSI-4009<br />

Embedded Computer – Computer system that is an integral part <strong>of</strong> a larger system.<br />

SOURCE: CNSSI-4009<br />

Embedded Cryptographic System –<br />

Cryptosystem performing or controlling a function as an integral<br />

element <strong>of</strong> a larger system or subsystem.<br />

SOURCE: CNSSI-4009<br />

Embedded Cryptography – Cryptography engineered into an equipment or system whose basic<br />

function is not cryptographic.<br />

SOURCE: CNSSI-4009<br />

Encipher – Convert plain text to cipher text by means <strong>of</strong> a cryptographic system.<br />

SOURCE: CNSSI-4009<br />

Pg 67

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!