23.03.2013 Views

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

<strong>Information</strong> Systems <strong>Security</strong><br />

Equipment Modification –<br />

<strong>Information</strong> Systems <strong>Security</strong><br />

Manager (ISSM) –<br />

<strong>Information</strong> Systems <strong>Security</strong><br />

Officer (ISSO) –<br />

<strong>Information</strong> Systems <strong>Security</strong><br />

Product –<br />

<strong>Information</strong> Technology –<br />

<strong>Information</strong> Type –<br />

Modification <strong>of</strong> any fielded hardware, firmware, s<strong>of</strong>tware, or portion<br />

there<strong>of</strong>, under NSA configuration control. There are three classes <strong>of</strong><br />

modifications: mandatory (to include human safety); optional/special<br />

mission modifications; and repair actions. These classes apply to<br />

elements, subassemblies, equipment, systems, and s<strong>of</strong>tware packages<br />

performing functions such as key generation, key distribution,<br />

message encryption, decryption, authentication, or those mechanisms<br />

necessary to satisfy security policy, labeling, identification, or<br />

accountability.<br />

SOURCE: CNSSI-4009<br />

Individual responsible for the information assurance <strong>of</strong> a program,<br />

organization, system, or enclave.<br />

SOURCE: CNSSI-4009<br />

Individual assigned responsibility for maintaining the appropriate<br />

operational security posture for an information system or program.<br />

SOURCE: CNSSI-4009<br />

Item (chip, module, assembly, or equipment), technique, or service<br />

that performs or relates to information systems security.<br />

SOURCE: CNSSI-4009<br />

Any equipment or interconnected system or subsystem <strong>of</strong> equipment<br />

that is used in the automatic acquisition, storage, manipulation,<br />

management, movement, control, display, switching, interchange,<br />

transmission, or reception <strong>of</strong> data or information by the executive<br />

agency. For purposes <strong>of</strong> the preceding sentence, equipment is used by<br />

an executive agency if the equipment is used by the executive agency<br />

directly or is used by a contractor under a contract with the executive<br />

agency which—<br />

1) requires the use <strong>of</strong> such equipment; or<br />

2) requires the use, to a significant extent, <strong>of</strong> such equipment in the<br />

performance <strong>of</strong> a service or the furnishing <strong>of</strong> a product.<br />

The term information technology includes computers, ancillary<br />

equipment, s<strong>of</strong>tware, firmware and similar procedures, services<br />

(including support services), and related resources.<br />

SOURCE: SP 800-53; SP 800-53A; SP 800-37; SP 800-18; SP 800-<br />

60; FIPS 200; FIPS 199; CNSSI-4009; 40 U.S.C., Sec. 11101 and<br />

Sec 1401<br />

A specific category <strong>of</strong> information (e.g., privacy, medical,<br />

proprietary, financial, investigative, contractor sensitive, security<br />

management), defined by an organization or in some instances, by a<br />

specific law, Executive Order, directive, policy, or regulation.<br />

SOURCE: SP 800-53; SP 800-53A; SP 800-37; SP 800-18; SP 800-<br />

60; FIPS 200; FIPS 199; CNSSI-4009<br />

Pg 97

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!