23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Identity Validation – Tests enabling an information system to authenticate users or<br />

resources.<br />

SOURCE: CNSSI-4009<br />

Identity Verification – The process <strong>of</strong> confirming or denying that a claimed identity is<br />

correct by comparing the credentials (something you know,<br />

something you have, something you are) <strong>of</strong> a person requesting<br />

access with those previously proven and stored in the PIV Card <strong>of</strong><br />

system and associated with the identity being claimed.<br />

SOURCE: FIPS 201<br />

Identity Verification – The process <strong>of</strong> confirming or denying that a claimed identity is<br />

correct by comparing the credentials (something you know,<br />

something you have, something you are) <strong>of</strong> a person requesting<br />

access with those previously proven and stored in the PIV Card or<br />

system and associated with the identity being claimed.<br />

SOURCE: SP 800-79<br />

Image – An exact bit-stream copy <strong>of</strong> all electronic data on a device,<br />

performed in a manner that ensures that the information is not<br />

altered.<br />

SOURCE: SP 800-72<br />

Imitative Communications<br />

Deception –<br />

Introduction <strong>of</strong> deceptive messages or signals into an adversary's<br />

telecommunications signals. See communications deception and<br />

manipulative communications deception.<br />

SOURCE: CNSSI-4009<br />

Impact – The magnitude <strong>of</strong> harm that can be expected to result from the<br />

consequences <strong>of</strong> unauthorized disclosure <strong>of</strong> information,<br />

unauthorized modification <strong>of</strong> information, unauthorized destruction<br />

<strong>of</strong> information, or loss <strong>of</strong> information or information system<br />

availability.<br />

SOURCE: SP 800-60<br />

Impact Level – The magnitude <strong>of</strong> harm that can be expected to result from the<br />

consequences <strong>of</strong> unauthorized disclosure <strong>of</strong> information,<br />

unauthorized modification <strong>of</strong> information, unauthorized destruction<br />

<strong>of</strong> information, or loss <strong>of</strong> information or information system<br />

availability.<br />

SOURCE: CNSSI-4009<br />

High, Moderate, or Low security categories <strong>of</strong> an information system<br />

established in FIPS 199 which classify the intensity <strong>of</strong> a potential<br />

impact that may occur if the information system is jeopardized.<br />

SOURCE: SP 800-34<br />

Pg 88

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!