23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Hot Site – A fully operational <strong>of</strong>fsite data processing facility equipped with<br />

hardware and s<strong>of</strong>tware, to be used in the event <strong>of</strong> an information<br />

system disruption.<br />

SOURCE: SP 800-34<br />

Backup site that includes phone systems with the phone lines already<br />

connected. Networks will also be in place, with any necessary routers<br />

and switches plugged in and turned on. Desks will have desktop PCs<br />

installed and waiting, and server areas will be replete with the<br />

necessary hardware to support business-critical functions. Within a<br />

few hours, a hot site can become a fully functioning element <strong>of</strong> an<br />

organization.<br />

SOURCE: CNSSI-4009<br />

Hot Wash – A debrief conducted immediately after an exercise or test with the<br />

staff and participants.<br />

SOURCE: SP 800-84<br />

Hybrid <strong>Security</strong> Control – A security control that is implemented in an information system in<br />

part as a common control and in part as a system-specific control.<br />

See also Common Control and System-Specific Control.<br />

SOURCE: SP 800-37; SP 800-53; SP 800-53A; CNSSI-4009<br />

IA Architecture – A description <strong>of</strong> the structure and behavior for an enterprise’s<br />

security processes, information security systems, personnel and<br />

organizational sub-units, showing their alignment with the<br />

enterprise’s mission and strategic plans.<br />

SOURCE: CNSSI-4009<br />

IA Infrastructure – The underlying security framework that lies beyond an enterprise’s<br />

defined boundary, but supports its IA and IA-enabled products, its<br />

security posture and its risk management plan.<br />

SOURCE: CNSSI-4009<br />

IA Product – Product whose primary purpose is to provide security services (e.g.,<br />

confidentiality, authentication, integrity, access control, nonrepudiation<br />

<strong>of</strong> data); correct known vulnerabilities; and/or provide<br />

layered defense against various categories <strong>of</strong> non-authorized or<br />

malicious penetrations <strong>of</strong> information systems or networks.<br />

SOURCE: CNSSI-4009<br />

Pg 85

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!