Glossary of Key Information Security Terms (NIST) part 28 / F - G - H

studied byStudied by 24 people
5.0(2)
get a hint
hint

Formal Method –

1 / 19

20 Terms

1

Formal Method –

Mathematical argument which verifies that the system satisfies a mathematically-described security policy.

New cards
2

Formal Proof –

Complete and convincing mathematical argument presenting the full logical justification for each proof step and for the truth of a theorem or set of theorems.

New cards
3

Formal Security Policy –

Mathematically-precise statement of a security policy.

New cards
4

Formatting Function –

The function that transforms the payload, associated data, and nonce into a sequence of complete blocks.

New cards
5

Forward Cipher –

One of the two functions of the block cipher algorithm that is determined by the choice of a cryptographic key. The term “forward cipher operation” is used for TDEA, while the term “forward transformation” is used for DEA.

New cards
6

Frequency Hopping –

Repeated switching of frequencies during radio transmission according to a specified algorithm, to minimize unauthorized interception or jamming of telecommunications.

New cards
7

Full Disk Encryption (FDE) –

The process of encrypting all the data on the hard disk drive used to boot a computer, including the computer’s operating system, and permitting access to the data only after successful authentication with the full disk encryption product.

New cards
8

Full Maintenance –

Complete diagnostic repair, modification, and overhaul of COMSEC equipment, including repair of defective assemblies by piece part replacement. See Limited Maintenance.

New cards
9

Functional Testing –

Segment of security testing in which advertised security mechanisms of an information system are tested under operational conditions.

New cards
10

Gateway –

Interface providing compatibility between networks by converting transmission speeds, protocols, codes, or security measures.

New cards
11

General Support System –

An interconnected set of information resources under the same direct management control that shares common functionality. It normally includes hardware, software, information, data, applications, communications, and people.

New cards
12

Global Information Grid (GIG) –

The globally interconnected, end-to-end set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel. The GIG includes owned and leased communications and computing systems and services, software (including applications), data, security services, other associated services, and National Security Systems. Non-GIG IT includes stand-alone, self-contained, or embedded IT that is not, and will not be, connected to the enterprise network.

New cards
13

Global Information Infrastructure – (GII)

Worldwide interconnections of the information systems of all countries, international and multinational organizations, and international commercial communications.

New cards
14

Graduated Security –

A security system that provides several levels (e.g., low, moderate, high) of protection based on threats, risks, available technology, support services, time, human concerns, and economics.

New cards
15

Group Authenticator –

Used, sometimes in addition to a sign-on authenticator, to allow access to specific data or functions that may be shared by all members of a particular group.

New cards
16

Guard (System) –

A mechanism limiting the exchange of information between information systems or subsystems.

New cards
17

Guessing Entropy –

A measure of the difficulty that an Attacker has to guess the average password used in a system. In this document, entropy is stated in bits. When a password has n-bits of guessing entropy then an attacker has as much difficulty guessing the average password as in guessing an n-bit random quantity. The attacker is assumed to know the actual password frequency distribution.

New cards
18

Hacker –

Unauthorized user who attempts to or gains access to an information system.

New cards
19

Handshaking Procedures –

Dialogue between two information systems for synchronizing, identifying, and authenticating themselves to one another.

New cards
20

Hard Copy Key –

Physical keying material, such as printed key lists, punched or printed key tapes, or programmable, read-only memories (PROM).

New cards

Explore top notes

note Note
studied byStudied by 43 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 10 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 5210 people
Updated ... ago
4.9 Stars(24)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 27 people
Updated ... ago
5.0 Stars(3)
note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)

Explore top flashcards

flashcards Flashcard83 terms
studied byStudied by 24 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard54 terms
studied byStudied by 22 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard157 terms
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard244 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard43 terms
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard122 terms
studied byStudied by 11 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard77 terms
studied byStudied by 28 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard67 terms
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)