23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Implant – Electronic device or electronic equipment modification designed to<br />

gain unauthorized interception <strong>of</strong> information-bearing emanations.<br />

SOURCE: CNSSI-4009<br />

Inadvertent Disclosure – Type <strong>of</strong> incident involving accidental exposure <strong>of</strong> information to an<br />

individual not authorized access.<br />

SOURCE: CNSSI-4009<br />

Inappropriate Usage – A person who violates acceptable use <strong>of</strong> any network or computer<br />

policies.<br />

SOURCE: SP 800-61<br />

Incident – A violation or imminent threat <strong>of</strong> violation <strong>of</strong> computer security<br />

policies, acceptable use policies, or standard security practices.<br />

SOURCE: SP 800-61<br />

Incident – An occurrence that actually or potentially jeopardizes the<br />

confidentiality, integrity, or availability <strong>of</strong> an information system or<br />

the information the system processes, stores, or transmits or that<br />

constitutes a violation or imminent threat <strong>of</strong> violation <strong>of</strong> security<br />

policies, security procedures, or acceptable use policies.<br />

SOURCE: FIPS 200; SP 800-53<br />

An assessed occurrence that actually or potentially jeopardizes the<br />

confidentiality, integrity, or availability <strong>of</strong> an information system; or<br />

the information the system processes, stores, or transmits; or that<br />

constitutes a violation or imminent threat <strong>of</strong> violation <strong>of</strong> security<br />

policies, security procedures, or acceptable use policies.<br />

SOURCE: CNSSI-4009<br />

Incident Handling – The mitigation <strong>of</strong> violations <strong>of</strong> security policies and recommended<br />

practices.<br />

SOURCE: SP 800-61<br />

Incident Response Plan – The documentation <strong>of</strong> a predetermined set <strong>of</strong> instructions or<br />

procedures to detect, respond to, and limit consequences <strong>of</strong> a<br />

malicious cyber attacks against an organization’s information<br />

system(s).<br />

SOURCE: SP 800-34<br />

The documentation <strong>of</strong> a predetermined set <strong>of</strong> instructions or<br />

procedures to detect, respond to, and limit consequences <strong>of</strong> an<br />

incident against an organization’s IT system(s).<br />

SOURCE: CNSSI-4009<br />

Pg 89

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!