Link Search Menu Expand Document

Appendix B - Glossary

  
Access ControlThe process of granting or denying specific requests to: 1) obtain and use information and related information processing services; and 2) enter specific physical facilities (e.g., federal buildings, military establishments, border crossing entrances).

SOURCE: FIPS 201-2
AccountabilityThe security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. This supports non-repudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action.

SOURCE: SP 800-27 Rev. A
Assurance Groundsfor confidence that the other four security goals (integrity, availability, confidentiality, and accountability) have been adequately met by a specific implementation. “Adequately met” includes (1) functionality that performs correctly, (2) sufficient protection against unintentional errors (by users or software), and (3) sufficient resistance to intentional penetration or by-pass.

SOURCE: SP 800-27 Rev. A
AttackAny kind of malicious activity that attempts to collect, disrupt, deny, degrade, or destroy information system resources or the information itself.

SOURCE: CNSSI-4009
AuditIndependent review and examination of records and activities to assess the adequacy of system controls, to ensure compliance with established policies and operational procedures.

SOURCE: CNSSI-4009
AuthenticationVerifying the identity of a user, process, or device, often as a prerequisite to allowing access to resources in a system.

SOURCE: FIPS 200
AuthorizationThe official management decision given by a senior official to authorize operation of a system or the common controls inherited by designated organizations systems and to explicitly accept the risk to organizational operations (including mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the Nation based on the implementation of an agreed-upon set of security and privacy controls. Also known as authorization to operate.

SOURCE: OMB Circular A-130, adapted
Authorizing Official (AO)A senior (federal) official or executive with the authority to formally assume responsibility for operating a system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation.

SOURCE: SP 800-37 Rev 1
Back doorAn undocumented way of gaining access to computer system. A backdoor is a potential security risk.

SOURCE: NIST SP 800-82 Rev 2
BiometricsA measurable physical characteristic or personal behavioral trait used to recognize the identity, or verify the claimed identity, of an applicant. Facial images, fingerprints, and iris scan samples are all examples of biometrics.

SOURCE: FIPS 201
BitA binary digit having a value of 0 or 1.

SOURCE: FIPS 180-4
Challenge-Response ProtocolAn authentication protocol where the verifier sends the claimant a challenge (usually a random value or a nonce) that the claimant combines with a secret (often by hashing the challenge and a shared secret together, or by applying a private key operation to the challenge) to generate a response that is sent to the verifier. The verifier can independently verify the response generated by the Claimant (such as by re-computing the hash of the challenge and the shared secret and comparing to the response, or performing a public key operation on the response) and establish that the Claimant possesses and controls the secret.

SOURCE: SP 800-63- 2
ChecksumA value that (a) is computed by a function that is dependent on the content of a data object and (b) is stored or transmitted together with the object, for detecting changes in the data

SOURCE: IETF RFC 4949 Ver. 2
CiphertextData in its encrypted form.

SOURCE: SP 800-57 Part 1 Rev. 4
Denial of ServiceThe prevention of authorized access to resources or the delaying of time-critical operations. (Time-critical may be milliseconds or it may be hours, depending upon the service provided).

SOURCE: CNSSI-4009
Digital SignatureThe result of a cryptographic transformation of data which, when properly implemented, provides the services of: 1. origin authentication, 2. data integrity, and 3. signer non-repudiation.

SOURCE: FIPS 140-2
EncryptionThe cryptographic transformation of data to produce ciphertext.

SOURCE: ISO 7498- 2
End-to-End EncryptionCommunications encryption in which data is encrypted when being passed through a network, but routing information remains visible.
FirewallA gateway that limits access between networks in accordance with local security policy.

SOURCE: SP 800-32
GatewayAn intermediate system (interface, relay) that attaches to two (or more) computer networks that have similar functions but dissimilar implementations and that enables either one-way or two-way communication between the networks.

SOURCE: IETF RFC 4949 Ver. 2
HackerUnauthorized user who attempts to or gains access to an information system.

SOURCE: CNSSI-4009
IncidentAn occurrence that actually or potentially jeopardizes the confidentiality, integrity, or availability of an information system or the information the system processes, stores, or transmits or that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies.

SOURCE: FIPS 200
Information1. Facts and ideas, which can be represented (encoded) as various forms of data.
2. Knowledge—e.g., data, instructions—in any medium or form that can be communicated between system entities.

SOURCE: IETF RFC 4949 Ver. 2
Information AssuranceMeasures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. These measures include providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.

Note: DoDI 8500.01 has transitioned from the term information assurance (IA) to the term cybersecurity. This could potentially impact IA related terms.

SOURCE: CNSSI-4009
Information SecurityThe protection of information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction in order to provide confidentiality, integrity, and availability.

SOURCE: 44 U.S.C., Sec. 3542
Information Security PolicyAggregate of directives, regulations, rules, and practices that prescribes how an organization manages, protects, and distributes information.

SOURCE: CNSSI-4009
Information Security RiskThe risk to organizational operations (including mission, functions, image, reputation), organizational assets, individuals, other organizations, and the Nation due to the potential for unauthorized access, use, disclosure, disruption, modification, or destruction of information and/or a system.

SOURCE: SP 800-30 Rev 1
Information SystemA discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. [Note: Information systems also include specialized systems such as industrial/process controls systems, telephone switching and private branch exchange (PBX) systems, and environmental control systems.]

SOURCE: 44 U.S.C., Sec. 3502
Information Technology(A) with respect to an executive agency means any equipment or interconnected system or subsystem of equipment, used in the automatic acquisition, storage, analysis, evaluation, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information by the executive agency, if the equipment is used by the executive agency directly or is used by a contractor under a contract with the executive agency that requires the use— (i) of that equipment; or (ii) of that equipment to a significant extent in the performance of a service or the furnishing of a product; (B) includes computers, ancillary equipment (including imaging peripherals, input, output, and storage devices necessary for security and surveillance), peripheral equipment designed to be controlled by the central processing unit of a computer, software, firmware and similar procedures, services (including support services), and related resources; but (C) does not include any equipment acquired by a federal contractor incidental to a federal contract.

SOURCE: 40 U.S.C., Sec. 11101
IntegrityGuarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.

SOURCE: 44 U.S.C., Sec. 3542
Intrusion Detection System (IDS)Software that automates the intrusion detection process.

SOURCE: SP 800- 94
KeyA parameter used in conjunction with a cryptographic algorithm that determines its operation.

Examples applicable to this Standard include:

1. The computation of a digital signature from data, and

2. The verification of a digital signature.

SOURCE: FIPS 186-4
Key ManagementThe activities involving the handling of cryptographic keys and other related security parameters (e.g., initialization vectors) during the entire lifecycle of the keys, including their generation, storage, establishment, entry and output, use and destruction.

SOURCE: SP 800-57 Part 1 Rev 4
Keystroke MonitoringThe process used to view or record both the keystrokes entered by a computer user and the computer’s response during an interactive session. Keystroke monitoring is usually considered a special case of audit trails.
Least PrivilegeThe principle that a security architecture should be designed so that each entity is granted the minimum system resources and authorizations that the entity needs to perform its function.

SOURCE: CNSSI-4009
Link EncryptionEncryption of information between nodes of a communications system.

SOURCE: CNSSI-4009
Logic BombA piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met.

COURCE: CNSSI-4009
Malicious CodeSoftware or firmware intended to perform an unauthorized process that will have adverse impact on the confidentiality, integrity, or availability of a system. A virus, worm, Trojan horse, or other code-based entity that infects a host. Spyware and some forms of adware are also examples of malicious code.

SOURCE: SP 800-53
MalwareSee Malicious Code.

SOURCE: SP 800-53
PasswordA string of characters (letters, numbers, and other symbols) used to authenticate an identity or to verify access authorization.

SOURCE: FIPS 140-2
Penetration TestingA test methodology in which assessors, typically working under specific constraints, attempt to circumvent or defeat the security features of a system.

SOURCE: SP 800-53
PhishingA technique for attempting to acquire sensitive data, such as bank account numbers, through a fraudulent solicitation in email or on a web site, in which the perpetrator masquerades as a legitimate business or reputable person.

SOURCE: IETF RFC 4949 Ver 2
Private KeyA cryptographic key, used with a public key cryptographic algorithm, that is uniquely associated with an entity and is not made public.

SOURCE: FIPS 140-2
PrivilegeA right granted to an individual, a program, or a process.

SOURCE: CNSSI-4009
Public KeyA cryptographic key used with a public key cryptographic algorithm that is uniquely associated with an entity and that may be made public.

SOURCE: FIPS 140-2
Public Key CryptographyEncryption system that uses a public-private key pair for encryption and/or digital signature. SOURCE: CNSSI-4009
Public Key Infrastructure (PKI)A Framework that is established to issue, maintain, and revoke public key certificates.

SOURCE: FIPS 186-4
ReciprocityMutual agreement among participating enterprises to accept each other’s security assessments in order to reuse information system resources and/or to accept each other’s assessed security posture in order to share information.

SOURCE: NIST SP 800-37
RiskA measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of: (i) the adverse impacts that would arise if the circumstance or event occurs; and (ii) the likelihood of occurrence. [Note: System-related security risks are those risks that arise from the loss of confidentiality, integrity, or availability of information or systems and reflect the potential adverse impacts to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation. Adverse impacts to the Nation include, for example, compromises to systems that support critical infrastructure applications or are paramount to government continuity of operations as defined by the Department of Homeland Security.]

SOURCE: SP 800-37
Risk AssessmentThe process of identifying risks to organizational operations (including mission, functions, image, reputation), organizational assets, individuals, other organizations, and the Nation, resulting from the operation of a system. Part of risk management, incorporates threat and vulnerability analyses, and considers mitigations provided by security controls planned or in place. Synonymous with risk analysis.

SOURCE: SP 800-39
Risk ManagementThe program and supporting processes to manage information security risk to organizational operations (including mission, functions, image, reputation), organizational assets, individuals, other organizations, and the Nation, and includes: (i) establishing the context for risk-related activities; (ii) assessing risk; (iii) responding to risk once determined; and (iv) monitoring risk over time.

SOURCE: SP 800-39
Risk Management Framework (RMF)A structured approach used to oversee and manage risk for an enterprise.

SOURCE: CNSSI-4009
RoleA job function or employment position to which people or other system entities may be assigned in a system.

SOURCE: IETF RFC 4949 Ver 2
SafeguardsProtective measures prescribed to meet the security requirements (i.e., confidentiality, integrity, and availability) specified for a system. Safeguards may include security features, management constraints, personnel security, and security of physical structures, areas, and devices. Synonymous with security controls and countermeasures.

SOURCE: FIPS 200
Secret KeyA cryptographic key, used with a secret key cryptographic algorithm, that is uniquely associated with one or more entities and should not be made public.

SOURCE: FIPS 140- 2
SecurityA condition that results from the establishment and maintenance of protective measures that enable an enterprise to perform its mission or critical functions despite risks posed by threats to its use of information systems. Protective measures may involve a combination of deterrence, avoidance, prevention, detection, recovery, and correction that should form part of the enterprise’s riskmanagement approach.

SOURCE: CNSSI-4009
Security Control AssessmentThe testing and/or evaluation of the management, operational, and technical security controls in a system to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system.

SOURCE: SP 800-37
Security ControlsThe management, operational, and technical controls (i.e., safeguards or countermeasures) prescribed for a system to protect the confidentiality, integrity, and availability of the system and its information.

SOURCE: FIPS 199
Security EngineeringAn interdisciplinary approach and means to enable the realization of secure systems. It focuses on defining customer needs, security protection requirements, and required functionality early in the systems development life cycle, documenting requirements, and then proceeding with design, synthesis, and system validation while considering the complete problem.

SOURCE: CNSSI-4009
Security LabelThe means used to associate a set of security attributes with a specific information object as part of the data structure for that object.

SOURCE: SP 800- 53
SensitivityA measure of the importance assigned to information by its owner, for the purpose of denoting its need for protection.

SOURCE: SP 800-60
SignatureA recognizable, distinguishing pattern associated with an attack, such as a binary string in a virus or a particular set of keystrokes used to gain unauthorized access to a system.

SOURCE: SP 800-61
SpamElectronic junk mail or the abuse of electronic messaging systems to indiscriminately send unsolicited bulk messages.

SOURCE: CNSSI-4009
SpywareSoftware that is secretly or surreptitiously installed into a system to gather information on individuals or organizations without their knowledge; a type of malicious code.

SOURCE: SP 800-53
SystemAny organized assembly of resources and procedures united and regulated by interaction or interdependence to accomplish a set of specific functions.
Note: Systems also include specialized systems such as industrial/process controls systems, telephone switching and private branch exchange (PBX) systems, and environmental control systems.

SOURCE: SP 800-53
System IntegrityThe quality that a system has when it performs its intended function in an unimpaired manner, free from unauthorized manipulation of the system, whether intentional or accidental.

SOURCE: SP 800-27
System Security PlanFormal document that provides an overview of the security requirements for the system and describes the security controls in place or planned for meeting those requirements.

SOURCE: SP 800-18
TailoringThe process by which a security control baseline is modified based on: (i) the application of scoping guidance; (ii) the specification of compensating security controls, if needed; and (iii) the specification of organization-defined parameters in the security controls via explicit assignment and selection statements.

SOURCE: SP 800-37
ThreatAny circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, or the Nation through a system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service.

SOURCE: SP 800-30
Threat EventAn event or situation that has the potential for causing undesirable consequences or impact.

SOURCE: NIST SP 800-30
TokenSomething that the Claimant possesses and controls (typically a key or password) that is used to authenticate the Claimant’s identity.

SOURCE: SP 800-63-2
Trojan HorseA computer program that appears to have a useful function, but also has a hidden and potentially malicious function that evades security mechanisms, sometimes by exploiting legitimate authorizations of a system entity that invokes the program.

SOURCE: CNSSI-4009
Trusted Computing BaseTotality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination responsible for enforcing a security policy.

SOURCE: CNSSI-4009
Trustworthy SystemComputer hardware, software and procedures that—

1) are reasonably secure from intrusion and misuse;

2) provide a reasonable level of availability, reliability, and correct operation;

3) are reasonably suited to performing their intended functions; and

4) adhere to generally accepted security procedures.

SOURCE: SP 800-32
ValidationConfirmation (through the provision of strong, sound, objective evidence) that requirements for a specific intended use or application have been fulfilled (e.g., a trustworthy credential has been presented, or data or information has been formatted in accordance with a defined set of rules, or a specific process has demonstrated that an entity under consideration meets, in all respects, its defined attributes or requirements).

SOURCE: CNSSI-4009
VirusA computer program that can copy itself and infect a computer without permission or knowledge of the user. A virus might corrupt or delete data on a computer, use e-mail programs to spread itself to other computers, or even erase everything on a hard disk. See malicious code.

Source: CNSSI-4009
VulnerabilityWeakness in an information system, system security procedures, internal controls, or implementation that could be exploited by a threat source.

SOURCE: NIST SP 800-30 Rev 1
WormA self-replicating, self-propagating, self-contained program that uses networking mechanisms to spread itself. See Malicious Code.

SOURCE: CNSSI-4009