23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

<strong>Information</strong> Assurance Vulnerability<br />

Alert (IAVA) –<br />

Notification that is generated when an <strong>Information</strong> Assurance<br />

vulnerability may result in an immediate and potentially severe threat<br />

to DoD systems and information; this alert requires corrective action<br />

because <strong>of</strong> the severity <strong>of</strong> the vulnerability risk.<br />

SOURCE: CNSSI-4009<br />

<strong>Information</strong> Domain – A three-part concept for information sharing, independent <strong>of</strong>, and<br />

across information systems and security domains that 1) identifies<br />

information sharing participants as individual members, 2) contains<br />

shared information objects, and 3) provides a security policy that<br />

identifies the roles and privileges <strong>of</strong> the members and the protections<br />

required for the information objects.<br />

SOURCE: CNSSI-4009<br />

<strong>Information</strong> Environment – Aggregate <strong>of</strong> individuals, organizations, and/or systems that collect,<br />

process, or disseminate information, also included is the information<br />

itself.<br />

SOURCE: CNSSI-4009<br />

<strong>Information</strong> Flow Control – Procedure to ensure that information transfers within an information<br />

system are not made in violation <strong>of</strong> the security policy.<br />

SOURCE: CNSSI-4009<br />

<strong>Information</strong> Management –<br />

The planning, budgeting, manipulating, and controlling <strong>of</strong><br />

information throughout its life cycle.<br />

SOURCE: CNSSI-4009<br />

<strong>Information</strong> Operations (IO) – The integrated employment <strong>of</strong> the core capabilities <strong>of</strong> electronic<br />

warfare, computer network operations, psychological operations,<br />

military deception, and operations security, in concert with specified<br />

supporting and related capabilities, to influence, disrupt, corrupt, or<br />

usurp adversarial human and automated decision-making process,<br />

information, and information systems while protecting our own.<br />

SOURCE: CNSSI-4009<br />

<strong>Information</strong> Owner –<br />

Official with statutory or operational authority for specified<br />

information and responsibility for establishing the controls for its<br />

generation, collection, processing, dissemination, and disposal.<br />

SOURCE: FIPS 200; SP 800-37; SP 800-53; SP 800-60; SP 800-18<br />

Official with statutory or operational authority for specified<br />

information and responsibility for establishing the controls for its<br />

generation, classification, collection, processing, dissemination, and<br />

disposal.<br />

SOURCE: CNSSI-4009<br />

Pg 92

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!