23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

<strong>Information</strong> System Contingency<br />

Plan (ISCP) –<br />

<strong>Information</strong> System Boundary – See Authorization Boundary<br />

<strong>Information</strong> System Life Cycle –<br />

<strong>Information</strong> System Owner<br />

(or Program Manager) –<br />

A discrete set <strong>of</strong> information resources organized for the collection,<br />

processing, maintenance, use, sharing, dissemination, or disposition<br />

<strong>of</strong> information.<br />

[Note: <strong>Information</strong> systems also include specialized systems such as<br />

industrial/process controls systems, telephone switching and private<br />

branch exchange (PBX) systems, and environmental control<br />

systems.]<br />

SOURCE: SP 800-53; CNSSI-4009<br />

Management policy and procedures designed to maintain or restore<br />

business operations, including computer operations, possibly at an<br />

alternate location, in the event <strong>of</strong> emergencies, system failures, or<br />

disasters.<br />

SOURCE: SP 800-34<br />

The phases through which an information system passes, typically<br />

characterized as initiation, development, operation, and termination<br />

(i.e., sanitization, disposal and/or destruction).<br />

SOURCE: CNSSI-4009<br />

Official responsible for the overall procurement, development,<br />

integration, modification, or operation and maintenance <strong>of</strong> an<br />

information system.<br />

SOURCE: SP 800-53; SP 800-53A; SP 800-18; SP 800-60<br />

<strong>Information</strong> System Owner – Official responsible for the overall procurement, development,<br />

integration, modification, or operation and maintenance <strong>of</strong> an<br />

information system.<br />

SOURCE: FIPS 200<br />

<strong>Information</strong> System <strong>Security</strong><br />

Officer (ISSO) –<br />

Individual with assigned responsibility for maintaining the<br />

appropriate operational security posture for an information system or<br />

program.<br />

SOURCE: SP 800-37; SP 800-53<br />

Individual assigned responsibility by the senior agency information<br />

security <strong>of</strong>ficer, authorizing <strong>of</strong>ficial, management <strong>of</strong>ficial, or<br />

information system owner for maintaining the appropriate operational<br />

security posture for an information system or program.<br />

SOURCE: SP 800-53A; SP 800-60<br />

Pg 95

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!