23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Focused Testing – A test methodology that assumes some knowledge <strong>of</strong> the internal<br />

structure and implementation detail <strong>of</strong> the assessment object. Also<br />

known as gray box testing.<br />

SOURCE: SP 800-53A<br />

Forensic Copy – An accurate bit-for-bit reproduction <strong>of</strong> the information contained on<br />

an electronic device or associated media, whose validity and integrity<br />

has been verified using an accepted algorithm.<br />

SOURCE: SP 800-72; CNSSI-4009<br />

Forensic Specialist – A pr<strong>of</strong>essional who locates, identifies, collects, analyzes, and<br />

examines data while preserving the integrity and maintaining a strict<br />

chain <strong>of</strong> custody <strong>of</strong> information discovered.<br />

SOURCE: SP 800-72<br />

Forensics – The practice <strong>of</strong> gathering, retaining, and analyzing computer-related<br />

data for investigative purposes in a manner that maintains the<br />

integrity <strong>of</strong> the data.<br />

SOURCE: CNSSI-4009<br />

See Also Computer Forensics<br />

Forensically Clean – Digital media that is completely wiped <strong>of</strong> all data, including<br />

nonessential and residual data, scanned for malware, and verified<br />

before use.<br />

SOURCE: SP 800-86<br />

Formal Access Approval – A formalization <strong>of</strong> the security determination for authorizing access<br />

to a specific type <strong>of</strong> classified or sensitive information, based on<br />

specified access requirements, a determination <strong>of</strong> the individual’s<br />

security eligibility and a determination that the individual’s <strong>of</strong>ficial<br />

duties require the individual be provided access to the information.<br />

Formal Development<br />

Methodology –<br />

SOURCE: CNSSI-4009<br />

S<strong>of</strong>tware development strategy that proves security design<br />

specifications.<br />

SOURCE: CNSSI-4009<br />

Formal Method – Mathematical argument which verifies that the system satisfies a<br />

mathematically-described security policy.<br />

SOURCE: CNSSI-4009<br />

Formal Pro<strong>of</strong> – Complete and convincing mathematical argument presenting the full<br />

logical justification for each pro<strong>of</strong> step and for the truth <strong>of</strong> a theorem<br />

or set <strong>of</strong> theorems.<br />

SOURCE: CNSSI-4009<br />

Pg 79

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!