23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

An interconnected set <strong>of</strong> information resources under the same direct<br />

management control which shares common functionality. A system<br />

normally includes hardware, s<strong>of</strong>tware, information, data,<br />

applications, communications, and people. A system can be, for<br />

example, a local area network (LAN) including smart terminals that<br />

supports a branch <strong>of</strong>fice, an agency-wide backbone, a<br />

communications network, a departmental data processing center<br />

including its operating system and utilities, a tactical radio network,<br />

or a shared information processing service organization (IPSO).<br />

SOURCE: CNSSI-4009<br />

Global <strong>Information</strong> Grid (GIG) – The globally interconnected, end-to-end set <strong>of</strong> information<br />

capabilities for collecting, processing, storing, disseminating, and<br />

managing information on demand to warfighters, policy makers, and<br />

support personnel. The GIG includes owned and leased<br />

communications and computing systems and services, s<strong>of</strong>tware<br />

(including applications), data, security services, other associated<br />

services, and National <strong>Security</strong> Systems. Non-GIG IT includes<br />

stand-alone, self-contained, or embedded IT that is not, and will not<br />

be, connected to the enterprise network.<br />

SOURCE: CNSSI-4009<br />

Global <strong>Information</strong> Infrastructure –<br />

(GII)<br />

Worldwide interconnections <strong>of</strong> the information systems <strong>of</strong> all<br />

countries, international and multinational organizations, and<br />

international commercial communications.<br />

SOURCE: CNSSI-4009<br />

Graduated <strong>Security</strong> – A security system that provides several levels (e.g., low, moderate,<br />

high) <strong>of</strong> protection based on threats, risks, available technology,<br />

support services, time, human concerns, and economics.<br />

SOURCE: FIPS 201<br />

Gray Box Testing – See Focused Testing.<br />

Group Authenticator – Used, sometimes in addition to a sign-on authenticator, to allow<br />

access to specific data or functions that may be shared by all<br />

members <strong>of</strong> a particular group.<br />

SOURCE: CNSSI-4009<br />

Guard (System) – A mechanism limiting the exchange <strong>of</strong> information between<br />

information systems or subsystems.<br />

SOURCE: CNSSI-4009<br />

Pg 81

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!