Glossary of Key Information Security Terms (NIST) part 34 / IN

studied byStudied by 2 people
5.0(1)
get a hint
hint

Information Systems Security Product –

1 / 19

20 Terms

1

Information Systems Security Product –

Item (chip, module, assembly, or equipment), technique, or service that performs or relates to information systems security.

New cards
2

Information Technology –

Any equipment or interconnected system or subsystem of equipment that is used in the automatic acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of data or information by the executive agency. For purposes of the preceding sentence, equipment is used by an executive agency if the equipment is used by the executive agency directly or is used by a contractor under a contract with the executive agency which— 1) requires the use of such equipment; or 2) requires the use, to a significant extent, of such equipment in the performance of a service or the furnishing of a product. The term information technology includes computers, ancillary equipment, software, firmware and similar procedures, services (including support services), and related resources.

New cards
3

Information Type –

A specific category of information (e.g., privacy, medical, proprietary, financial, investigative, contractor sensitive, security management), defined by an organization or in some instances, by a specific law, Executive Order, directive, policy, or regulation.

New cards
4

Information Value –

A qualitative measure of the importance of the information based upon factors such as: level of robustness of the Information Assurance controls allocated to the protection of information based upon: mission criticality, the sensitivity (e.g., classification and compartmentalization) of the information, releasability to other countries, perishability/longevity of the information (e.g., short life data versus long life intelligence source data), and potential impact of loss of confidentiality and integrity and/or availability of the information.

New cards
5

Initialization Vector (IV) –

A vector used in defining the starting point of an encryption process within a cryptographic algorithm.

New cards
6

Initialize –

Setting the state of a cryptographic logic prior to key generation, encryption, or other operating mode.

New cards
7

Initiator –

The entity that initiates an authentication exchange.

New cards
8

Inside Threat –

An entity with authorized access that has the potential to harm an information system through destruction, disclosure, modification of data, and/or denial of service.

New cards
9

Inside(r) Threat –

An entity with authorized access (i.e., within the security domain) that has the potential to harm an information system or enterprise through destruction, disclosure, modification of data, and/or denial of service.

New cards
10

Inspectable Space –

Three dimensional space surrounding equipment that processes classified and/or sensitive information within which TEMPEST exploitation is not considered practical or where legal authority to identify and remove a potential TEMPEST exploitation exists. Synonymous with zone of control.

New cards
11

Integrity –

Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity.

New cards
12

Integrity –

The property that sensitive data has not been modified or deleted in an unauthorized and undetected manner. The property whereby an entity has not been modified in an unauthorized manner.

New cards
13

Integrity Check Value –

Checksum capable of detecting modification of an information system.

New cards
14

Intellectual Property –

Useful artistic, technical, and/or industrial information, knowledge or ideas that convey ownership and control of tangible or virtual usage and/or representation. Creations of the mind such as musical, literary, and artistic works; inventions; and symbols, names, images, and designs used in commerce, including copyrights, trademarks, patents, and related rights. Under intellectual property law, the holder of one of these abstract “properties” has certain exclusive rights to the creative work, commercial symbol, or invention by which it is covered.

New cards
15

Interconnection Security Agreement (ISA) –

An agreement established between the organizations that own and operate connected IT systems to document the technical requirements of the interconnection. The ISA also supports a Memorandum of Understanding or Agreement (MOU/A) between the organizations. A document that regulates security-relevant aspects of an intended connection between an agency and an external system. It regulates the security interface between any two systems operating under two different distinct authorities. It includes a variety of descriptive, technical, procedural, and planning information. It is usually preceded by a formal MOA/MOU that defines high-level roles and responsibilities in management of a cross-domain connection.

New cards
16

Interface –

Common boundary between independent systems or modules where interactions take place.

New cards
17

Interface Control Document –

Technical document describing interface controls and identifying the authorities and responsibilities for ensuring the operation of such controls. This document is baselined during the preliminary design review and is maintained throughout the information system life cycle.

New cards
18

Interim Approval to Operate – (IATO)

Temporary authorization granted by a DAA for an information system to process information based on preliminary results of a security evaluation of the system. (To be replaced by ATO and POA&M)

New cards
19

Interim Approval to Test (IATT) –

Temporary authorization to test an information system in a specified operational information environment within the time frame and under the conditions or constraints enumerated in the written authorization.

New cards
20

Intermediate Certification Authority (CA) –

A Certification Authority that is subordinate to another CA, and has a CA subordinate to itself.

New cards

Explore top notes

note Note
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 11 people
Updated ... ago
5.0 Stars(2)
note Note
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 4 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 15 people
Updated ... ago
5.0 Stars(3)
note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 3224 people
Updated ... ago
4.6 Stars(22)

Explore top flashcards

flashcards Flashcard57 terms
studied byStudied by 9 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard66 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard129 terms
studied byStudied by 5 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard52 terms
studied byStudied by 2 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard39 terms
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard37 terms
studied byStudied by 31 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard58 terms
studied byStudied by 1335 people
Updated ... ago
5.0 Stars(10)
flashcards Flashcard48 terms
studied byStudied by 31 people
Updated ... ago
5.0 Stars(1)