23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

Industrial Control System – An information system used to control industrial processes such as<br />

manufacturing, product handling, production, and distribution.<br />

Industrial control systems include supervisory control and data<br />

acquisition systems (SCADA) used to control geographically<br />

dispersed assets, as well as distributed control systems (DCS) and<br />

smaller control systems using programmable logic controllers to<br />

control localized processes.<br />

SOURCE: SP 800-53; SP 800-53A<br />

Informal <strong>Security</strong> Policy – Natural language description, possibly supplemented by<br />

mathematical arguments, demonstrating the correspondence <strong>of</strong> the<br />

functional specification to the high-level design.<br />

SOURCE: CNSSI-4009<br />

<strong>Information</strong> – An instance <strong>of</strong> an information type.<br />

SOURCE: FIPS 200; FIPS 199; SP 800-60; SP 800-53; SP 800-37<br />

Any communication or representation <strong>of</strong> knowledge such as facts,<br />

data, or opinions in any medium or form, including textual,<br />

numerical, graphic, cartographic, narrative, or audiovisual.<br />

SOURCE: CNSSI-4009<br />

<strong>Information</strong> Assurance (IA) – Measures that protect and defend information and information<br />

systems by ensuring their availability, integrity, authentication,<br />

confidentiality, and non-repudiation. These measures include<br />

providing for restoration <strong>of</strong> information systems by incorporating<br />

protection, detection, and reaction capabilities.<br />

SOURCE: SP 800-59; CNSSI-4009<br />

<strong>Information</strong> Assurance Component –<br />

(IAC)<br />

<strong>Information</strong> Assurance Manager –<br />

(IAM)<br />

<strong>Information</strong> Assurance Officer –<br />

(IAO)<br />

<strong>Information</strong> Assurance (IA)<br />

Pr<strong>of</strong>essional –<br />

An application (hardware and/or s<strong>of</strong>tware) that provides one or more<br />

<strong>Information</strong> Assurance capabilities in support <strong>of</strong> the overall security<br />

and operational objectives <strong>of</strong> a system.<br />

SOURCE: CNSSI-4009<br />

See information systems security manager.<br />

SOURCE: CNSSI-4009<br />

See information systems security <strong>of</strong>ficer.<br />

SOURCE: CNSSI-4009<br />

Individual who works IA issues and has real-world experience plus<br />

appropriate IA training and education commensurate with their level<br />

<strong>of</strong> IA responsibility.<br />

SOURCE: CNSSI-4009<br />

Pg 91

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!