23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

High Assurance Guard (HAG) –<br />

An enclave boundary protection device that controls access between<br />

a local area network that an enterprise system has a requirement to<br />

protect, and an external network that is outside the control <strong>of</strong> the<br />

enterprise system, with a high degree <strong>of</strong> assurance.<br />

SOURCE: SP 800-32<br />

A guard that has two basic functional capabilities: a Message Guard<br />

and a Directory Guard. The Message Guard provides filter service<br />

for message traffic traversing the Guard between adjacent security<br />

domains. The Director Guard provides filter service for directory<br />

access and updates traversing the Guard between adjacent security<br />

domains.<br />

SOURCE: CNSSI-4009<br />

High Availability – A failover feature to ensure availability during device or component<br />

interruptions.<br />

SOURCE: SP 800-113<br />

High Impact – The loss <strong>of</strong> confidentiality, integrity, or availability that could be<br />

expected to have a severe or catastrophic adverse effect on<br />

organizational operations, organizational assets, individuals, other<br />

organizations, or the national security interests <strong>of</strong> the United States;<br />

(i.e., 1) causes a severe degradation in mission capability to an extent<br />

and duration that the organization is able to perform its primary<br />

functions, but the effectiveness <strong>of</strong> the functions is significantly<br />

reduced; 2) results in major damage to organizational assets; 3)<br />

results in major financial loss; or 4) results in severe or catastrophic<br />

harm to individuals involving loss <strong>of</strong> life or serious life threatening<br />

injuries).<br />

SOURCE: FIPS 199; CNSSI-4009<br />

High-Impact System – An information system in which at least one security objective (i.e.,<br />

confidentiality, integrity, or availability) is assigned a FIPS 199<br />

potential impact value <strong>of</strong> high.<br />

SOURCE: SP 800-37; SP 800-53; SP 800-60; FIPS 200<br />

An information system in which at least one security objective (i.e.,<br />

confidentiality, integrity, or availability) is assigned a potential<br />

impact value <strong>of</strong> high.<br />

SOURCE: CNSSI-4009<br />

Honeypot – A system (e.g., a Web server) or system resource (e.g., a file on a<br />

server) that is designed to be attractive to potential crackers and<br />

intruders and has no authorized users other than its administrators.<br />

SOURCE: CNSSI-4009<br />

Pg 84

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!