23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Alternate COMSEC Custodian – Individual designated by proper authority to perform the duties <strong>of</strong> the<br />

COMSEC custodian during the temporary absence <strong>of</strong> the COMSEC<br />

custodian.<br />

SOURCE: CNSSI-4009<br />

Alternate Work Site – Governmentwide, national program allowing federal employees to<br />

work at home or at geographically convenient satellite <strong>of</strong>fices for part<br />

<strong>of</strong> the work week (e.g., telecommuting).<br />

SOURCE: CNSSI-4009<br />

Analysis – The examination <strong>of</strong> acquired data for its significance and probative<br />

value to the case.<br />

SOURCE: SP 800-72<br />

Anomaly-Based Detection – The process <strong>of</strong> comparing definitions <strong>of</strong> what activity is considered<br />

normal against observed events to identify significant deviations.<br />

SOURCE: SP 800-94<br />

Anti-jam – Countermeasures ensuring that transmitted information can be<br />

received despite deliberate jamming attempts.<br />

SOURCE: CNSSI-4009<br />

Anti-spo<strong>of</strong> – Countermeasures taken to prevent the unauthorized use <strong>of</strong> legitimate<br />

Identification & Authentication (I&A) data, however it was obtained,<br />

to mimic a subject different from the attacker.<br />

SOURCE: CNSSI-4009<br />

Antispyware S<strong>of</strong>tware – A program that specializes in detecting both malware and nonmalware<br />

forms <strong>of</strong> spyware.<br />

SOURCE: SP 800-69<br />

Antivirus S<strong>of</strong>tware – A program that monitors a computer or network to identify all major<br />

types <strong>of</strong> malware and prevent or contain malware incidents.<br />

SOURCE: SP 800-83<br />

Applicant – The subscriber is sometimes called an “applicant” after applying to a<br />

certification authority for a certificate, but before the certificate<br />

issuance procedure is completed.<br />

SOURCE: SP 800-32<br />

Application –<br />

A s<strong>of</strong>tware program hosted by an information system.<br />

SOURCE: SP 800-37<br />

Pg 9

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!