NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

NISTIR 7298 Revision 1, Glossary of Key Information Security Terms NISTIR 7298 Revision 1, Glossary of Key Information Security Terms

csrc.nist.gov
from csrc.nist.gov More from this publisher
23.03.2013 Views

NIST IR 7298 Revision 1, Glossary of Key Information Security Terms Information Value – A qualitative measure of the importance of the information based upon factors such as: level of robustness of the Information Assurance controls allocated to the protection of information based upon: mission criticality, the sensitivity (e.g., classification and compartmentalization) of the information, releasability to other countries, perishability/longevity of the information (e.g., short life data versus long life intelligence source data), and potential impact of loss of confidentiality and integrity and/or availability of the information. SOURCE: CNSSI-4009 Ingress Filtering – The process of blocking incoming packets that use obviously false IP addresses, such as reserved source addresses. SOURCE: SP 800-61 Inheritance – See Security Control Inheritance. Initialization Vector (IV) – A vector used in defining the starting point of an encryption process within a cryptographic algorithm. SOURCE: FIPS 140-2 Initialize – Setting the state of a cryptographic logic prior to key generation, encryption, or other operating mode. SOURCE: CNSSI-4009 Initiator – The entity that initiates an authentication exchange. SOURCE: FIPS 196 Inside Threat – An entity with authorized access that has the potential to harm an information system through destruction, disclosure, modification of data, and/or denial of service. SOURCE: SP 800-32 Inside(r) Threat – An entity with authorized access (i.e., within the security domain) that has the potential to harm an information system or enterprise through destruction, disclosure, modification of data, and/or denial of service. SOURCE: CNSSI-4009 Inspectable Space – Three dimensional space surrounding equipment that processes classified and/or sensitive information within which TEMPEST exploitation is not considered practical or where legal authority to identify and remove a potential TEMPEST exploitation exists. Synonymous with zone of control. SOURCE: CNSSI-4009 Pg 98

NIST IR 7298 Revision 1, Glossary of Key Information Security Terms Integrity – Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. SOURCE: SP 800-53; SP 800-53A; SP 800-18; SP 800-27; SP 800- 37; SP 800-60; FIPS 200; FIPS 199; 44 U.S.C., Sec. 3542 Integrity – The property that sensitive data has not been modified or deleted in an unauthorized and undetected manner. SOURCE: FIPS 140-2 The property whereby an entity has not been modified in an unauthorized manner. SOURCE: CNSSI-4009 Integrity Check Value – Checksum capable of detecting modification of an information system. SOURCE: CNSSI-4009 Intellectual Property – Useful artistic, technical, and/or industrial information, knowledge or ideas that convey ownership and control of tangible or virtual usage and/or representation. SOURCE: SP 800-32 Interconnection Security Agreement (ISA) – Creations of the mind such as musical, literary, and artistic works; inventions; and symbols, names, images, and designs used in commerce, including copyrights, trademarks, patents, and related rights. Under intellectual property law, the holder of one of these abstract “properties” has certain exclusive rights to the creative work, commercial symbol, or invention by which it is covered. SOURCE: CNSSI-4009 An agreement established between the organizations that own and operate connected IT systems to document the technical requirements of the interconnection. The ISA also supports a Memorandum of Understanding or Agreement (MOU/A) between the organizations. SOURCE: SP 800-47 A document that regulates security-relevant aspects of an intended connection between an agency and an external system. It regulates the security interface between any two systems operating under two different distinct authorities. It includes a variety of descriptive, technical, procedural, and planning information. It is usually preceded by a formal MOA/MOU that defines high-level roles and responsibilities in management of a cross-domain connection. SOURCE: CNSSI-4009 Pg 99

NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />

<strong>Information</strong> Value – A qualitative measure <strong>of</strong> the importance <strong>of</strong> the information based<br />

upon factors such as: level <strong>of</strong> robustness <strong>of</strong> the <strong>Information</strong><br />

Assurance controls allocated to the protection <strong>of</strong> information based<br />

upon: mission criticality, the sensitivity (e.g., classification and<br />

compartmentalization) <strong>of</strong> the information, releasability to other<br />

countries, perishability/longevity <strong>of</strong> the information (e.g., short life<br />

data versus long life intelligence source data), and potential impact <strong>of</strong><br />

loss <strong>of</strong> confidentiality and integrity and/or availability <strong>of</strong> the<br />

information.<br />

SOURCE: CNSSI-4009<br />

Ingress Filtering – The process <strong>of</strong> blocking incoming packets that use obviously false IP<br />

addresses, such as reserved source addresses.<br />

SOURCE: SP 800-61<br />

Inheritance – See <strong>Security</strong> Control Inheritance.<br />

Initialization Vector (IV) –<br />

A vector used in defining the starting point <strong>of</strong> an encryption process<br />

within a cryptographic algorithm.<br />

SOURCE: FIPS 140-2<br />

Initialize – Setting the state <strong>of</strong> a cryptographic logic prior to key generation,<br />

encryption, or other operating mode.<br />

SOURCE: CNSSI-4009<br />

Initiator – The entity that initiates an authentication exchange.<br />

SOURCE: FIPS 196<br />

Inside Threat – An entity with authorized access that has the potential to harm an<br />

information system through destruction, disclosure, modification <strong>of</strong><br />

data, and/or denial <strong>of</strong> service.<br />

SOURCE: SP 800-32<br />

Inside(r) Threat – An entity with authorized access (i.e., within the security domain)<br />

that has the potential to harm an information system or enterprise<br />

through destruction, disclosure, modification <strong>of</strong> data, and/or denial <strong>of</strong><br />

service.<br />

SOURCE: CNSSI-4009<br />

Inspectable Space – Three dimensional space surrounding equipment that processes<br />

classified and/or sensitive information within which TEMPEST<br />

exploitation is not considered practical or where legal authority to<br />

identify and remove a potential TEMPEST exploitation exists.<br />

Synonymous with zone <strong>of</strong> control.<br />

SOURCE: CNSSI-4009<br />

Pg 98

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!