23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Federal <strong>Information</strong> <strong>Security</strong><br />

Management Act (FISMA) –<br />

A statute (Title III, P.L. 107-347) that requires agencies to assess risk<br />

to information systems and provide information security protections<br />

commensurate with the risk. FISMA also requires that agencies<br />

integrate information security into their capital planning and<br />

enterprise architecture processes, conduct annual information systems<br />

security reviews <strong>of</strong> all programs and systems, and report the results<br />

<strong>of</strong> those reviews to OMB.<br />

SOURCE: CNSSI-4009<br />

Federal <strong>Information</strong> System – An information system used or operated by an executive agency, by a<br />

contractor <strong>of</strong> an executive agency, or by another organization on<br />

behalf <strong>of</strong> an executive agency.<br />

SOURCE: SP 800-53; FIPS 200; FIPS 199; 40 U.S.C., Sec. 11331;<br />

CNSSI-4009<br />

Federal <strong>Information</strong> Systems<br />

<strong>Security</strong> Educators’ Association –<br />

(FISSEA)<br />

Federal Public <strong>Key</strong> Infrastructure<br />

Policy Authority (FPKI PA) –<br />

An organization whose members come from federal agencies,<br />

industry, and academic institutions devoted to improving the IT<br />

security awareness and knowledge within the federal government and<br />

its related external workforce.<br />

SOURCE: SP 800-16<br />

The Federal PKI Policy Authority is a federal government body<br />

responsible for setting, implementing, and administering policy<br />

decisions regarding interagency PKI interoperability that uses the<br />

FBCA.<br />

SOURCE: SP 800-32<br />

File Encryption – The process <strong>of</strong> encrypting individual files on a storage medium and<br />

permitting access to the encrypted data only after proper<br />

authentication is provided.<br />

SOURCE: SP 800-111<br />

File Infector Virus – A virus that attaches itself to a program file, such as a word<br />

processor, spreadsheet application, or game.<br />

SOURCE: SP 800-61<br />

File Integrity Checker – S<strong>of</strong>tware that generates, stores, and compares message digests for<br />

files to detect changes to the files.<br />

SOURCE: SP 800-61<br />

File Name Anomaly – 1. A mismatch between the internal file header and its external<br />

extension; or<br />

2. A file name inconsistent with the content <strong>of</strong> the file (e.g., renaming<br />

a graphics file with a non-graphical extension.<br />

SOURCE: SP 800-72<br />

Pg 76

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!