NISTIR 7298 Revision 1, Glossary of Key Information Security Terms
NISTIR 7298 Revision 1, Glossary of Key Information Security Terms NISTIR 7298 Revision 1, Glossary of Key Information Security Terms
NIST IR 7298 Revision 1, Glossary of Key Information Security Terms Information Value – A qualitative measure of the importance of the information based upon factors such as: level of robustness of the Information Assurance controls allocated to the protection of information based upon: mission criticality, the sensitivity (e.g., classification and compartmentalization) of the information, releasability to other countries, perishability/longevity of the information (e.g., short life data versus long life intelligence source data), and potential impact of loss of confidentiality and integrity and/or availability of the information. SOURCE: CNSSI-4009 Ingress Filtering – The process of blocking incoming packets that use obviously false IP addresses, such as reserved source addresses. SOURCE: SP 800-61 Inheritance – See Security Control Inheritance. Initialization Vector (IV) – A vector used in defining the starting point of an encryption process within a cryptographic algorithm. SOURCE: FIPS 140-2 Initialize – Setting the state of a cryptographic logic prior to key generation, encryption, or other operating mode. SOURCE: CNSSI-4009 Initiator – The entity that initiates an authentication exchange. SOURCE: FIPS 196 Inside Threat – An entity with authorized access that has the potential to harm an information system through destruction, disclosure, modification of data, and/or denial of service. SOURCE: SP 800-32 Inside(r) Threat – An entity with authorized access (i.e., within the security domain) that has the potential to harm an information system or enterprise through destruction, disclosure, modification of data, and/or denial of service. SOURCE: CNSSI-4009 Inspectable Space – Three dimensional space surrounding equipment that processes classified and/or sensitive information within which TEMPEST exploitation is not considered practical or where legal authority to identify and remove a potential TEMPEST exploitation exists. Synonymous with zone of control. SOURCE: CNSSI-4009 Pg 98
NIST IR 7298 Revision 1, Glossary of Key Information Security Terms Integrity – Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. SOURCE: SP 800-53; SP 800-53A; SP 800-18; SP 800-27; SP 800- 37; SP 800-60; FIPS 200; FIPS 199; 44 U.S.C., Sec. 3542 Integrity – The property that sensitive data has not been modified or deleted in an unauthorized and undetected manner. SOURCE: FIPS 140-2 The property whereby an entity has not been modified in an unauthorized manner. SOURCE: CNSSI-4009 Integrity Check Value – Checksum capable of detecting modification of an information system. SOURCE: CNSSI-4009 Intellectual Property – Useful artistic, technical, and/or industrial information, knowledge or ideas that convey ownership and control of tangible or virtual usage and/or representation. SOURCE: SP 800-32 Interconnection Security Agreement (ISA) – Creations of the mind such as musical, literary, and artistic works; inventions; and symbols, names, images, and designs used in commerce, including copyrights, trademarks, patents, and related rights. Under intellectual property law, the holder of one of these abstract “properties” has certain exclusive rights to the creative work, commercial symbol, or invention by which it is covered. SOURCE: CNSSI-4009 An agreement established between the organizations that own and operate connected IT systems to document the technical requirements of the interconnection. The ISA also supports a Memorandum of Understanding or Agreement (MOU/A) between the organizations. SOURCE: SP 800-47 A document that regulates security-relevant aspects of an intended connection between an agency and an external system. It regulates the security interface between any two systems operating under two different distinct authorities. It includes a variety of descriptive, technical, procedural, and planning information. It is usually preceded by a formal MOA/MOU that defines high-level roles and responsibilities in management of a cross-domain connection. SOURCE: CNSSI-4009 Pg 99
- Page 48 and 49: NIST IR 7298 Revision 1, Glossary o
- Page 50 and 51: NIST IR 7298 Revision 1, Glossary o
- Page 52 and 53: NIST IR 7298 Revision 1, Glossary o
- Page 54 and 55: NIST IR 7298 Revision 1, Glossary o
- Page 56 and 57: NIST IR 7298 Revision 1, Glossary o
- Page 58 and 59: NIST IR 7298 Revision 1, Glossary o
- Page 60 and 61: NIST IR 7298 Revision 1, Glossary o
- Page 62 and 63: NIST IR 7298 Revision 1, Glossary o
- Page 64 and 65: NIST IR 7298 Revision 1, Glossary o
- Page 66 and 67: NIST IR 7298 Revision 1, Glossary o
- Page 68 and 69: NIST IR 7298 Revision 1, Glossary o
- Page 70 and 71: NIST IR 7298 Revision 1, Glossary o
- Page 72 and 73: NIST IR 7298 Revision 1, Glossary o
- Page 74 and 75: NIST IR 7298 Revision 1, Glossary o
- Page 76 and 77: NIST IR 7298 Revision 1, Glossary o
- Page 78 and 79: NIST IR 7298 Revision 1, Glossary o
- Page 80 and 81: NIST IR 7298 Revision 1, Glossary o
- Page 82 and 83: NIST IR 7298 Revision 1, Glossary o
- Page 84 and 85: NIST IR 7298 Revision 1, Glossary o
- Page 86 and 87: NIST IR 7298 Revision 1, Glossary o
- Page 88 and 89: NIST IR 7298 Revision 1, Glossary o
- Page 90 and 91: NIST IR 7298 Revision 1, Glossary o
- Page 92 and 93: NIST IR 7298 Revision 1, Glossary o
- Page 94 and 95: NIST IR 7298 Revision 1, Glossary o
- Page 96 and 97: NIST IR 7298 Revision 1, Glossary o
- Page 100 and 101: NIST IR 7298 Revision 1, Glossary o
- Page 102 and 103: NIST IR 7298 Revision 1, Glossary o
- Page 104 and 105: NIST IR 7298 Revision 1, Glossary o
- Page 106 and 107: NIST IR 7298 Revision 1, Glossary o
- Page 108 and 109: NIST IR 7298 Revision 1, Glossary o
- Page 110 and 111: NIST IR 7298 Revision 1, Glossary o
- Page 112 and 113: NIST IR 7298 Revision 1, Glossary o
- Page 114 and 115: NIST IR 7298 Revision 1, Glossary o
- Page 116 and 117: NIST IR 7298 Revision 1, Glossary o
- Page 118 and 119: NIST IR 7298 Revision 1, Glossary o
- Page 120 and 121: NIST IR 7298 Revision 1, Glossary o
- Page 122 and 123: NIST IR 7298 Revision 1, Glossary o
- Page 124 and 125: NIST IR 7298 Revision 1, Glossary o
- Page 126 and 127: NIST IR 7298 Revision 1, Glossary o
- Page 128 and 129: NIST IR 7298 Revision 1, Glossary o
- Page 130 and 131: NIST IR 7298 Revision 1, Glossary o
- Page 132 and 133: NIST IR 7298 Revision 1, Glossary o
- Page 134 and 135: NIST IR 7298 Revision 1, Glossary o
- Page 136 and 137: NIST IR 7298 Revision 1, Glossary o
- Page 138 and 139: NIST IR 7298 Revision 1, Glossary o
- Page 140 and 141: NIST IR 7298 Revision 1, Glossary o
- Page 142 and 143: NIST IR 7298 Revision 1, Glossary o
- Page 144 and 145: NIST IR 7298 Revision 1, Glossary o
- Page 146 and 147: NIST IR 7298 Revision 1, Glossary o
NIST IR <strong>7298</strong> <strong>Revision</strong> 1, <strong>Glossary</strong> <strong>of</strong> <strong>Key</strong> <strong>Information</strong> <strong>Security</strong> <strong>Terms</strong><br />
<strong>Information</strong> Value – A qualitative measure <strong>of</strong> the importance <strong>of</strong> the information based<br />
upon factors such as: level <strong>of</strong> robustness <strong>of</strong> the <strong>Information</strong><br />
Assurance controls allocated to the protection <strong>of</strong> information based<br />
upon: mission criticality, the sensitivity (e.g., classification and<br />
compartmentalization) <strong>of</strong> the information, releasability to other<br />
countries, perishability/longevity <strong>of</strong> the information (e.g., short life<br />
data versus long life intelligence source data), and potential impact <strong>of</strong><br />
loss <strong>of</strong> confidentiality and integrity and/or availability <strong>of</strong> the<br />
information.<br />
SOURCE: CNSSI-4009<br />
Ingress Filtering – The process <strong>of</strong> blocking incoming packets that use obviously false IP<br />
addresses, such as reserved source addresses.<br />
SOURCE: SP 800-61<br />
Inheritance – See <strong>Security</strong> Control Inheritance.<br />
Initialization Vector (IV) –<br />
A vector used in defining the starting point <strong>of</strong> an encryption process<br />
within a cryptographic algorithm.<br />
SOURCE: FIPS 140-2<br />
Initialize – Setting the state <strong>of</strong> a cryptographic logic prior to key generation,<br />
encryption, or other operating mode.<br />
SOURCE: CNSSI-4009<br />
Initiator – The entity that initiates an authentication exchange.<br />
SOURCE: FIPS 196<br />
Inside Threat – An entity with authorized access that has the potential to harm an<br />
information system through destruction, disclosure, modification <strong>of</strong><br />
data, and/or denial <strong>of</strong> service.<br />
SOURCE: SP 800-32<br />
Inside(r) Threat – An entity with authorized access (i.e., within the security domain)<br />
that has the potential to harm an information system or enterprise<br />
through destruction, disclosure, modification <strong>of</strong> data, and/or denial <strong>of</strong><br />
service.<br />
SOURCE: CNSSI-4009<br />
Inspectable Space – Three dimensional space surrounding equipment that processes<br />
classified and/or sensitive information within which TEMPEST<br />
exploitation is not considered practical or where legal authority to<br />
identify and remove a potential TEMPEST exploitation exists.<br />
Synonymous with zone <strong>of</strong> control.<br />
SOURCE: CNSSI-4009<br />
Pg 98