23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Enterprise Risk Management – The methods and processes used by an enterprise to manage risks to<br />

its mission and to establish the trust necessary for the enterprise to<br />

support shared missions. It involves the identification <strong>of</strong> mission<br />

dependencies on enterprise capabilities, the identification and<br />

prioritization <strong>of</strong> risks due to defined threats, the implementation <strong>of</strong><br />

countermeasures to provide both a static risk posture and an effective<br />

dynamic response to active threats; and it assesses enterprise<br />

performance against threats and adjusts countermeasures as<br />

necessary.<br />

SOURCE: CNSSI-4009<br />

Enterprise Service – A set <strong>of</strong> one or more computer applications and middleware systems<br />

hosted on computer hardware that provides standard information<br />

systems capabilities to end users and hosted mission applications and<br />

services.<br />

SOURCE: CNSSI-4009<br />

Entity – Either a subject (an active element that operates on information or the<br />

system state) or an object (a passive element that contains or receives<br />

information).<br />

SOURCE: SP 800-27<br />

Entity – An active element in an open system.<br />

SOURCE: FIPS 188<br />

Entity – Any participant in an authentication exchange; such a participant may<br />

be human or nonhuman, and may take the role <strong>of</strong> a claimant and/or<br />

verifier.<br />

SOURCE: FIPS 196<br />

Entrapment – Deliberate planting <strong>of</strong> apparent flaws in an IS for the purpose <strong>of</strong><br />

detecting attempted penetrations.<br />

SOURCE: CNSSI-4009<br />

Entropy – A measure <strong>of</strong> the amount <strong>of</strong> uncertainty that an attacker faces to<br />

determine the value <strong>of</strong> a secret.<br />

SOURCE: SP 800-63<br />

Environment – Aggregate <strong>of</strong> external procedures, conditions, and objects affecting<br />

the development, operation, and maintenance <strong>of</strong> an information<br />

system.<br />

SOURCE: FIPS 200; CNSSI-4009<br />

Environment <strong>of</strong> Operation – The physical surroundings in which an information system<br />

processes, stores, and transmits information.<br />

SOURCE: SP 800-37; SP 800-53A<br />

Pg 70

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!