23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

File Protection – Aggregate <strong>of</strong> processes and procedures designed to inhibit<br />

unauthorized access, contamination, elimination, modification, or<br />

destruction <strong>of</strong> a file or any <strong>of</strong> its contents.<br />

SOURCE: CNSSI-4009<br />

File <strong>Security</strong> – Means by which access to computer files is limited to authorized<br />

users only.<br />

SOURCE: CNSSI-4009<br />

Fill Device – COMSEC item used to transfer or store key in electronic form or to<br />

insert key into a cryptographic equipment.<br />

SOURCE: CNSSI-4009<br />

FIPS – See Federal <strong>Information</strong> Processing Standard.<br />

FIPS-Approved <strong>Security</strong> Method – A security method (e.g., cryptographic algorithm, cryptographic key<br />

generation algorithm or key distribution technique, random number<br />

generator, authentication technique, or evaluation criteria) that is<br />

either a) specified in a FIPS, or b) adopted in a FIPS.<br />

SOURCE: FIPS 196<br />

FIPS-Validated Cryptography – A cryptographic module validated by the Cryptographic Module<br />

Validation Program (CMVP) to meet requirements specified in<br />

FIPS 140-2 (as amended). As a prerequisite to CMVP validation,<br />

the cryptographic module is required to employ a cryptographic<br />

algorithm implementation that has successfully passed validation<br />

testing by the Cryptographic Algorithm Validation Program<br />

(CAVP). See NSA-Approved Cryptography.<br />

SOURCE: SP 800-53<br />

FIPS PUB – An acronym for Federal <strong>Information</strong> Processing Standards<br />

Publication. FIPS publications (PUB) are issued by NIST after<br />

approval by the Secretary <strong>of</strong> Commerce.<br />

SOURCE: SP 800-64<br />

FIREFLY – <strong>Key</strong> management protocol based on public key cryptography.<br />

SOURCE: CNSSI-4009<br />

Firewall – A gateway that limits access between networks in accordance with<br />

local security policy.<br />

SOURCE: SP 800-32<br />

A hardware/s<strong>of</strong>tware capability that limits access between networks<br />

and/or systems in accordance with a specific security policy.<br />

SOURCE: CNSSI-4009<br />

Pg 77

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!