23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

IA-Enabled <strong>Information</strong> Technology<br />

Product –<br />

Product or technology whose primary role is not security, but which<br />

provides security services as an associated feature <strong>of</strong> its intended<br />

operating capabilities. Examples include such products as securityenabled<br />

Web browsers, screening routers, trusted operating systems,<br />

and security-enabled messaging systems.<br />

SOURCE: CNSSI-4009<br />

IA-Enabled Product – Product whose primary role is not security, but provides security<br />

services as an associated feature <strong>of</strong> its intended operating<br />

capabilities.<br />

Note: Examples include such products as security-enabled Web<br />

browsers, screening routers, trusted operating systems, and security<br />

enabling messaging systems.<br />

SOURCE: CNSSI-4009<br />

Identification – The process <strong>of</strong> verifying the identity <strong>of</strong> a user, process, or device,<br />

usually as a prerequisite for granting access to resources in an IT<br />

system.<br />

SOURCE: SP 800-47<br />

Identification – The process <strong>of</strong> discovering the true identity (i.e., origin, initial<br />

history) <strong>of</strong> a person or item from the entire collection <strong>of</strong> similar<br />

persons or items.<br />

SOURCE: FIPS 201<br />

An act or process that presents an identifier to a system so that the<br />

system can recognize a system entity (e.g., user, process, or device)<br />

and distinguish that entity from all others.<br />

SOURCE: CNSSI-4009<br />

Identifier – Unique data used to represent a person’s identity and associated<br />

attributes. A name or a card number are examples <strong>of</strong> identifiers.<br />

SOURCE: FIPS 201<br />

A data object - <strong>of</strong>ten, a printable, non-blank character string - that<br />

definitively represents a specific identity <strong>of</strong> a system entity,<br />

distinguishing that identity from all others.<br />

SOURCE: CNSSI-4009<br />

Identity – A unique name <strong>of</strong> an individual person. Since the legal names <strong>of</strong><br />

persons are not necessarily unique, the identity <strong>of</strong> a person must<br />

include sufficient additional information to make the complete name<br />

unique.<br />

SOURCE: SP 800-63<br />

Pg 86

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!