23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

<strong>Information</strong> Resources –<br />

<strong>Information</strong> Resources<br />

Management (IRM) –<br />

<strong>Information</strong> <strong>Security</strong> –<br />

<strong>Information</strong> and related resources, such as personnel, equipment,<br />

funds, and information technology.<br />

SOURCE: FIPS 200; FIPS 199; SP 800-53; SP 800-18; SP 800-60;<br />

44 U.S.C., Sec. 3502; CNSSI-4009<br />

The planning, budgeting, organizing, directing, training, controlling,<br />

and management activities associated with the burden, collection,<br />

creation, use, and dissemination <strong>of</strong> information by agencies.<br />

SOURCE: CNSSI-4009<br />

The protection <strong>of</strong> information and information systems from<br />

unauthorized access, use, disclosure, disruption, modification, or<br />

destruction in order to provide confidentiality, integrity, and<br />

availability.<br />

SOURCE: SP 800-37; SP 800-53; SP 800-53A; SP 800-18; SP 800-<br />

60; CNSSI-4009; FIPS 200; FIPS 199; 44 U.S.C., Sec. 3542<br />

<strong>Information</strong> <strong>Security</strong> – Protecting information and information systems from unauthorized<br />

access, use, disclosure, disruption, modification, or destruction in<br />

order to provide—<br />

1) integrity, which means guarding against improper information<br />

modification or destruction, and includes ensuring information<br />

nonrepudiation and authenticity;<br />

2) confidentiality, which means preserving authorized restrictions on<br />

access and disclosure, including means for protecting personal<br />

privacy and proprietary information; and<br />

3) availability, which means ensuring timely and reliable access to<br />

and use <strong>of</strong> information.<br />

SOURCE: SP 800-66; 44 U.S.C., Sec 3541<br />

<strong>Information</strong> <strong>Security</strong> Architect – Individual, group, or organization responsible for ensuring that<br />

the information security requirements necessary to protect the<br />

organization’s core missions and business processes are<br />

adequately addressed in all aspects <strong>of</strong> enterprise architecture<br />

including reference models, segment and solution architectures,<br />

and the resulting information systems supporting those missions<br />

and business processes.<br />

SOURCE: SP 800-37<br />

<strong>Information</strong> <strong>Security</strong> Policy –<br />

Aggregate <strong>of</strong> directives, regulations, rules, and practices that<br />

prescribes how an organization manages, protects, and distributes<br />

information.<br />

SOURCE: SP 800-53; SP 800-37; SP 800-18; CNSSI-4009<br />

Pg 93

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!