23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

End-Item Accounting – Accounting for all the accountable components <strong>of</strong> a COMSEC<br />

equipment configuration by a single short title.<br />

SOURCE: CNSSI-4009<br />

End Cryptographic Unit (ECU) – Device that (1) performs cryptographic functions, (2) typically is part<br />

<strong>of</strong> a larger system for which the device provides security services,<br />

and (3) from the viewpoint <strong>of</strong> a supporting security infrastructure<br />

(e.g., a key management system), is the lowest level <strong>of</strong> identifiable<br />

component with which a management transaction can be conducted.<br />

SOURCE: CNSSI-4009<br />

End-to-End Encryption – Communications encryption in which data is encrypted when being<br />

passed through a network, but routing information remains visible.<br />

SOURCE: SP 800-12<br />

Encryption <strong>of</strong> information at its origin and decryption at its intended<br />

destination without intermediate decryption.<br />

SOURCE: CNSSI-4009<br />

End-to-End <strong>Security</strong> – Safeguarding information in an information system from point <strong>of</strong><br />

origin to point <strong>of</strong> destination.<br />

SOURCE: CNSSI-4009<br />

Enrollment Manager – The management role that is responsible for assigning user identities<br />

to management and non-management roles.<br />

SOURCE: CNSSI-4009<br />

Enterprise – An organization with a defined mission/goal and a defined boundary,<br />

using information systems to execute that mission, and with<br />

responsibility for managing its own risks and performance. An<br />

enterprise may consist <strong>of</strong> all or some <strong>of</strong> the following business<br />

aspects: acquisition, program management, financial management<br />

(e.g., budgets), human resources, security, and information systems,<br />

information and mission management.<br />

SOURCE: CNSSI-4009<br />

Enterprise Architecture (EA) – The description <strong>of</strong> an enterprise’s entire set <strong>of</strong> information systems:<br />

how they are configured, how they are integrated, how they interface<br />

to the external environment at the enterprise’s boundary, how they<br />

are operated to support the enterprise mission, and how they<br />

contribute to the enterprise’s overall security posture.<br />

SOURCE: CNSSI-4009<br />

Pg 69

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!