23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

<strong>Information</strong> System-Related<br />

<strong>Security</strong> Risks –<br />

<strong>Information</strong> Systems <strong>Security</strong> –<br />

(INFOSEC)<br />

<strong>Information</strong> Systems <strong>Security</strong><br />

Engineer (ISSE) –<br />

<strong>Information</strong> Systems <strong>Security</strong><br />

Engineering (ISSE) –<br />

Individual assigned responsibility by the senior agency information<br />

security <strong>of</strong>ficer, authorizing <strong>of</strong>ficial, management <strong>of</strong>ficial, or<br />

information system owner for ensuring that the appropriate<br />

operational security posture is maintained for an information system<br />

or program.<br />

SOURCE: SP 800-18<br />

<strong>Information</strong> system-related security risks are those risks that arise<br />

through the loss <strong>of</strong> confidentiality, integrity, or availability <strong>of</strong><br />

information or information systems and consider impacts to the<br />

organization (including assets, mission, functions, image, or<br />

reputation), individuals, other organizations, and the Nation.<br />

See Risk.<br />

SOURCE: SP 800-37; SP 800-53A<br />

Protection <strong>of</strong> information systems against unauthorized access to or<br />

modification <strong>of</strong> information, whether in storage, processing, or<br />

transit, and against the denial <strong>of</strong> service to authorized users, including<br />

those measures necessary to detect, document, and counter such<br />

threats.<br />

SOURCE: CNSSI-4009<br />

Individual assigned responsibility for conducting information system<br />

security engineering activities.<br />

SOURCE: SP 800-37; CNSSI-4009<br />

Process <strong>of</strong> capturing and refining information protection<br />

requirements to ensure their integration into information systems<br />

acquisition and information systems development through purposeful<br />

security design or configuration.<br />

SOURCE: CNSSI-4009<br />

Process that captures and refines information security requirements<br />

and ensures their integration into information technology component<br />

products and information systems through purposeful security design<br />

or configuration.<br />

SOURCE: SP 800-37<br />

Pg 96

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!