PREVIOUS

NEXT

alert

Notification that a specific attack has been directed at an organization’s information systems.

allied nation

A nation allied with the U.S. in a current defense effort and with which the U.S. has certain treaties. For an authoritative list of allied nations, contact the Office of the Assistant Legal Adviser for Treaty Affairs, Office of the Legal Adviser, U.S. Department of State, or see the list of U.S. Collective Defense Arrangements at www.state.gov.
Source: CNSSI No. 4005 (COMSEC)

allocation

The process an organization employs to determine whether security controls are defined as system-specific, hybrid, or common.
The process an organization employs to assign security controls to specific information system components responsible for providing a particular security capability (e.g., router, server, remote sensor).
Source: NIST SP 800-37 Rev 1

all-source intelligence

Intelligence products and/or organizations and activities that incorporate all sources of information, most frequently human resources intelligence, imagery intelligence, measurement and signature intelligence, signals intelligence, and open source data in the production of finished intelligence.
Source: DoD JP 1-02 (adapted); NIST SP 800-53 Rev 4 (adapted)

alternate COMSEC account manager

The primary alternate COMSEC Account Manager is an individual designated by proper authority to perform the duties of the COMSEC Account Manager during the temporary authorized absence of the COMSEC Account Manager. Additional alternate COMSEC Account Managers may be appointed, as necessary, to assist the COMSEC Account Manager and maintain continuity of operations.
Source: CNSSI No. 4005 (COMSEC)

alternate COMSEC custodian (C.F.D.)

Individual designated by proper authority to perform the duties of the COMSEC custodian during the temporary absence of the COMSEC custodian.
Source: NSA/CSS Manual Number 3-16 (COMSEC)

analysis approach

The approach used to define the orientation or starting point of the risk assessment, the level of detail in the assessment, and how risks due to similar threat scenarios are treated.
Source: NIST SP 800-30 Rev 1

anti-jam

The result of measures to resist attempts to interfere with communications reception.
Source: CNSSI No. 1200

anti-signal fingerprint

Result of measures used to resist attempts to uniquely identify a particular transmitter based on its signal parameters.
Source: CNSSI No. 1200