Glossary of Key Information Security Terms (NIST) part 49 / P -Q -R

studied byStudied by 2 people
5.0(1)
get a hint
hint

Pseudorandom number generator – (PRNG)

1 / 19

20 Terms

1

Pseudorandom number generator – (PRNG)

An algorithm that produces a sequence of bits that are uniquely determined from an initial value called a seed. The output of the PRNG “appears” to be random, i.e., the output is statistically indistinguishable from random values. A cryptographic PRNG has the additional property that the output is unpredictable, given that the seed is not known.

New cards
2

Pseudonym –

A false name. 1. A subscriber name that has been chosen by the subscriber that is not verified as meaningful by identity proofing. 2. An assigned identity that is used to protect an individual’s true identity.

New cards
3

Public Domain Software –

Software not protected by copyright laws of any nation that may be freely used without permission of, or payment to, the creator, and that carries no warranties from, or liabilities to the creator.

New cards
4

Purge –

Rendering sanitized data unrecoverable by laboratory attack methods.

New cards
5

Quadrant –

Short name referring to technology that provides tamper-resistant protection to cryptographic equipment.

New cards
6

Qualitative Assessment –

Use of a set of methods, principles, or rules for assessing risk based on nonnumeric categories or levels.

New cards
7

Quality of Service –

The measurable end-to-end performance properties of a network service, which can be guaranteed in advance by a Service-Level Agreement between a user and a service provider, so as to satisfy specific customer application requirements. Note: These properties may include throughput (bandwidth), transit delay (latency), error rates, priority, security, packet loss, packet jitter, etc.

New cards
8

Quantitative Assessment –

Use of a set of methods, principles, or rules for assessing risks based on the use of numbers where the meanings and proportionality of values are maintained inside and outside the context of the assessment.

New cards
9

Quarantine –

Store files containing malware in isolation for future disinfection or examination.

New cards
10

Radio Frequency Identification – (RFID)

A form of automatic identification and data capture (AIDC) that uses electric or magnetic fields at radio frequencies to transmit information.

New cards
11

Random Bit Generator (RBG) –

A device or algorithm that outputs a sequence of binary bits that appears to be statistically independent and unbiased. An RBG is either a DRBG or an NRBG.

New cards
12

Random Number Generator – (RNG)

A process used to generate an unpredictable series of numbers. Each individual value is called random if each of the values in the total population of values has an equal probability of being selected.

New cards
13

Random Number Generator – (RNG)

Random Number Generators (RNGs) used for cryptographic applications typically produce a sequence of zero and one bits that may be combined into sub-sequences or blocks of random numbers. There are two basic classes: deterministic and nondeterministic. A deterministic RNG consists of an algorithm that produces a sequence of bits from an initial value called a seed. A nondeterministic RNG produces output that is dependent on some unpredictable physical source that is outside human control.

New cards
14

Randomizer –

Analog or digital source of unpredictable, unbiased, and usually independent bits. Randomizers can be used for several different functions, including key generation or to provide a starting state for a key generator.

New cards
15

RBAC –

See Role-Based Access Control.

New cards
16

Read –

Fundamental operation in an information system that results only in the flow of information from an object to a subject.

New cards
17

Read Access –

Permission to read information in an information system.

New cards
18

Real-Time Reaction –

Immediate response to a penetration attempt that is detected and diagnosed in time to prevent access.

New cards
19

Recipient Usage Period –

The period of time during the cryptoperiod of a symmetric key when protected information is processed.

New cards
20

Reciprocity –

Mutual agreement among participating enterprises to accept each other’s security assessments in order to reuse information system resources and/or to accept each other’s assessed security posture in order to share information. Mutual agreement among participating organizations to accept each other’s security assessments in order to reuse information system resources and/or to accept each other’s assessed security posture in order to share information.

New cards

Explore top notes

note Note
studied byStudied by 3 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 6 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 14 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 6703 people
Updated ... ago
4.8 Stars(50)

Explore top flashcards

flashcards Flashcard45 terms
studied byStudied by 45 people
Updated ... ago
5.0 Stars(2)
flashcards Flashcard793 terms
studied byStudied by 34 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard196 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard58 terms
studied byStudied by 104 people
Updated ... ago
4.8 Stars(4)
flashcards Flashcard43 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard40 terms
studied byStudied by 12 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard35 terms
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard91 terms
studied byStudied by 28 people
Updated ... ago
5.0 Stars(3)