23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Examine – A type <strong>of</strong> assessment method that is characterized by the process <strong>of</strong><br />

checking, inspecting, reviewing, observing, studying, or analyzing<br />

one or more assessment objects to facilitate understanding, achieve<br />

clarification, or obtain evidence, the results <strong>of</strong> which are used to<br />

support the determination <strong>of</strong> security control effectiveness over time.<br />

SOURCE: SP 800-53A<br />

Exculpatory Evidence – Evidence that tends to decrease the likelihood <strong>of</strong> fault or guilt.<br />

SOURCE: SP 800-72<br />

Executive Agency –<br />

An executive department specified in 5 United States Code (U.S.C.),<br />

Sec. 101; a military department specified in 5 U.S.C., Sec. 102; an<br />

independent establishment as defined in 5 U.S.C., Sec. 104(1); and a<br />

wholly owned government corporation fully subject to the provisions<br />

<strong>of</strong> 31 U.S.C., Chapter 91.<br />

SOURCE: SP 800-53; SP 800-37; FIPS 200; FIPS 199; 41 U.S.C.,<br />

Sec. 403; CNSSI-4009<br />

Exercise <strong>Key</strong> – Cryptographic key material used exclusively to safeguard<br />

communications transmitted over-the-air during military or organized<br />

civil training exercises.<br />

SOURCE: CNSSI-4009<br />

Exploit Code – A program that allows attackers to automatically break into a system.<br />

SOURCE: SP 800-40<br />

Exploitable Channel – Channel that allows the violation <strong>of</strong> the security policy governing an<br />

information system and is usable or detectable by subjects external to<br />

the trusted computing base. See covert channel.<br />

SOURCE: CNSSI-4009<br />

External <strong>Information</strong> System (or<br />

Component) –<br />

External <strong>Information</strong> System<br />

Service –<br />

An information system or component <strong>of</strong> an information system that is<br />

outside <strong>of</strong> the authorization boundary established by the organization<br />

and for which the organization typically has no direct control over the<br />

application <strong>of</strong> required security controls or the assessment <strong>of</strong> security<br />

control effectiveness.<br />

SOURCE: SP 800-37; SP 800-53; CNSSI-4009<br />

An information system service that is implemented outside <strong>of</strong> the<br />

authorization boundary <strong>of</strong> the organizational information system<br />

(i.e., a service that is used by, but not a part <strong>of</strong>, the organizational<br />

information system) and for which the organization typically has<br />

no direct control over the application <strong>of</strong> required security controls<br />

or the assessment <strong>of</strong> security control effectiveness.<br />

SOURCE: SP 800-53; SP 800-37; CNSSI-4009<br />

Pg 72

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!