23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Guessing Entropy – A measure <strong>of</strong> the difficulty that an attacker has to guess the average<br />

password used in a system. In this document, entropy is stated in bits.<br />

When a password has n-bits <strong>of</strong> guessing entropy then an attacker has<br />

as much difficulty guessing the average password as in guessing an<br />

n-bit random quantity. The attacker is assumed to know the actual<br />

password frequency distribution.<br />

SOURCE: SP 800-63<br />

Hacker – Unauthorized user who attempts to or gains access to an information<br />

system.<br />

SOURCE: CNSSI-4009<br />

Handler – A type <strong>of</strong> program used in DDoS attacks to control agents distributed<br />

throughout a network. Also refers to an incident handler, which<br />

refers to a person who performs incident response work.<br />

SOURCE: SP 800-61<br />

Handshaking Procedures – Dialogue between two information systems for synchronizing,<br />

identifying, and authenticating themselves to one another.<br />

SOURCE: CNSSI-4009<br />

Hard Copy <strong>Key</strong> – Physical keying material, such as printed key lists, punched or<br />

printed key tapes, or programmable, read-only memories (PROM).<br />

SOURCE: CNSSI-4009<br />

Hardening – Configuring a host’s operating systems and applications to reduce the<br />

host’s security weaknesses.<br />

SOURCE: SP 800-123<br />

Hardware – The physical components <strong>of</strong> an information system. See s<strong>of</strong>tware and<br />

firmware.<br />

SOURCE: CNSSI-4009<br />

Hardwired <strong>Key</strong> – Permanently installed key.<br />

SOURCE: CNSSI-4009<br />

Hash Function – A function that maps a bit string <strong>of</strong> arbitrary length to a fixed length<br />

bit string. Approved hash functions satisfy the following properties:<br />

1) One-Way. It is computationally infeasible to find any input that<br />

maps to any prespecified output.<br />

2) Collision Resistant. It is computationally infeasible to find any<br />

two distinct inputs that map to the same output.<br />

SOURCE: SP 800-63; FIPS 201<br />

Pg 82

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!