COMSEC equipment  | 
    Equipment designed to provide    security to telecommunications by converting information to a form    unintelligible to an unauthorized interceptor and, subsequently, by    reconverting such information to its original form for authorized recipients;    also, equipment designed specifically to aid in, or as an essential element    of, the conversion process. COMSEC equipment includes    cryptographic-equipment, crypto-ancillary equipment, cryptographic production    equipment, and authentication equipment.   | 
    
  | 
  |
COMSEC facility  | 
    The space used for    generating, storing, repairing, or using COMSEC material. The COMSEC material    may be in either physical or electronic form. Unless otherwise noted, the    term "COMSEC facility" refers to all types of COMSEC facilities,    including telecommunications facilities, and includes platforms such as    ships, aircraft, and vehicles.   | 
    
  | 
  |
COMSEC incident  | 
    Any occurrence that    potentially jeopardizes the security of COMSEC material or the secure    transmission of national security information. COMSEC Incident includes    Cryptographic Incident, Personnel Incident, Physical Incident, and Protective    Technology/Package Incident.   | 
    
  | 
  |
COMSEC Incident Monitoring Activity (CIMA)  | 
    The office within a    department or agency maintaining a record of COMSEC incidents caused by    elements of that department or agency, and ensuring all actions required of    those elements are completed.   | 
    
  | 
  |
COMSEC insecurity  | 
    A COMSEC incident that has    been investigated, evaluated, and determined to jeopardize the security of    COMSEC material or the secure transmission of information.   | 
    
  | 
  |
COMSEC manager (C.F.D.)  | 
    Individual who manages the    COMSEC resources of an organization.   | 
    
  | 
  |
COMSEC material  | 
    Item(s) designed to secure or    authenticate telecommunications. COMSEC material includes, but is not limited    to key, equipment, modules, devices, documents, hardware, firmware, or    software that embodies or describes cryptographic logic and other items that    perform COMSEC functions. This includes Controlled Cryptographic Item (CCI)    equipment, Cryptographic High Value Products (CHVP) and other Suite B    equipment, etc.   | 
    
  | 
  |
COMSEC module (C.F.D.)  | 
    Removable component that    performs COMSEC functions in a telecommunications equipment or system.   | 
    
  | 
  |
COMSEC monitoring  | 
    The act of listening to,    copying, or recording transmissions of one's own official telecommunications    to provide material for analysis in order to determine the degree of security    being provided to those transmissions.   | 
    
  | 
  |
COMSEC profile (C.F.D.)  | 
    Statement of COMSEC measures    and materials used to protect a given operation, system, or organization.   | 
    
  | 
  |
COMSEC service authority  | 
    See service authority.   | 
    
  | 
  |
COMSEC software  | 
    Includes all types of COMSEC    material, except key, in electronic or physical form. This includes all    classifications of unencrypted software, and all associated data used to    design, create, program, or run that software. It also, includes all types of    source/executable/object code and associated files that implement, execute,    embody, contain, or describe cryptographic mechanisms, functions,    capabilities, or requirements. COMSEC software also includes transmission    security (TRANSEC) software and may include any software used for purposes of    providing confidentiality, integrity, authentication, authorization, or    availability services to information in electronic form.   | 
    
  | 
  |
COMSEC survey (C.F.D.)  | 
    Organized collection of    COMSEC and communications information relative to a given operation, system,    or organization.   | 
    
  | 
  |
COMSEC system data (C.F.D.)  | 
    Information required by a    COMSEC equipment or system to enable it to properly handle and control key.   | 
    
  | 
  |
COMSEC training  | 
    Teaching of skills relating    to COMSEC accounting and the use of COMSEC aids.   | 
    
  | 
  |
concept of operations (CONOP)  | 
    See security concept of operations.  | 
    
  | 
  |
confidentiality  | 
    Preserving authorized    restrictions on information access and disclosure, including means for    protecting personal privacy and proprietary information.   | 
    
  | 
  |
configuration control  | 
    Process of controlling    modifications to hardware, firmware, software, and documentation to protect    the information system against improper modifications prior to, during, and    after system implementation.   | 
    
  | 
  |
configuration control board (CCB)  | 
    Establishment of and charter for a group of qualified people with responsibility for the process of controlling and approving changes throughout the development and operational lifecycle of products and systems; may also be referred to as a change control board.  | 
    
  | 
  |
configuration item  | 
    An aggregation of information    system components that is designated for configuration management and treated    as a single entity in the configuration management process.   | 
    
  | 
  |
configuration management  | 
    A collection of activities    focused on establishing and maintaining the integrity of information    technology products and information systems, through control of processes for    initializing, changing, and monitoring the configurations of those products    and systems throughout the system development life cycle.   | 
    
  | 
  |
configuration settings  | 
    The set of parameters that    can be changed in hardware, software, or firmware that affect the security    posture and/or functionality of the information system.   | 
    
  | 
  |
consent banner  | 
    See security banner (also known as notice and consent banners)  | 
    
  | 
  |
contamination  | 
    See spillage.  | 
    
  | 
  |
content signing certificate  | 
    A certificate issued for the    purpose of digitally signing information (content) to confirm the author and    guarantee that the content has not been altered or corrupted since it was    signed by use of a cryptographic hash.   | 
    
  | 
  |
contingency key  | 
    Key held for use under    specific operational conditions or in support of specific contingency plans.   | 
    
  | 
  |
contingency plan  | 
    Management policy and procedures used to guide an enterprise response to a perceived loss of mission capability. The Contingency Plan is the first plan used by the enterprise risk managers to determine what happened, why, and what to do. It may point to the continuity of operations plan (COOP) or disaster recovery plan (DRP) for major disruptions.  | 
    
  | 
  |
continuity of government (COG)  | 
    A coordinated effort within the Federal Government's executive branch to ensure that national essential functions continue to be performed during a catastrophic emergency.  | 
    
  | 
  |
continuity of operations plan   | 
    A predetermined set of    instructions or procedures that describe how an organization’s    mission-essential functions will be sustained within 12 hours and for up to    30 days as a result of a disaster event before returning to normal    operations.   | 
    
  | 
  |
continuous monitoring  | 
    Maintaining ongoing awareness    to support organizational risk decisions.   | 
    
  | 
  |
control correlation identifier (CCI)  | 
    Decomposition of a National    Institute of Standards and Technology (NIST) control into a single,    actionable, measurable statement.   | 
    
  | 
  |
controlled access area  | 
    The complete building or    facility area under direct physical control within which unauthorized persons    are denied unrestricted access and are either escorted by authorized    personnel or are under continuous physical or electronic surveillance.   | 
    
  | 
  |
controlled access protection (C.F.D.)  | 
    Minimum set of security    functionality that enforces access control on individual users and makes them    accountable for their actions through login procedures, auditing of    security-relevant events, and resource isolation.   | 
    
  | 
  |
controlled area  | 
    Any area or space for which    the organization has confidence that the physical and procedural protections    provided are sufficient to meet the requirements established for protecting    the information and/or information system.   | 
    
  | 
  |
controlled cryptographic item (CCI)  | 
    Secure telecommunications or    information system, or associated cryptographic component, that is    unclassified and handled through the COMSEC material control system (CMCS),    an equivalent material control system, or a combination of the two that    provides accountability and visibility. Such items are marked “Controlled    Cryptographic Item”, or, where space is limited, “CCI”.   | 
    
  | 
  |
controlled cryptographic item (CCI) assembly  | 
    A device approved by the National    Security Agency (NSA) as a controlled cryptographic item, that embodies a    cryptographic logic or other cryptographic design, and performs the entire    COMSEC function, but is dependent upon the host equipment to operate.   | 
    
  | 
  |
controlled cryptographic item (CCI) component  | 
    A device approved by the    National Security Agency as a controlled cryptographic item that embodies a    cryptographic logic or other cryptographic design, and does not perform the    entire the COMSEC function but is dependent upon a host equipment or    assembly, to complete and operate the COMSEC function.   | 
    
  | 
  |
controlled cryptographic item (CCI) equipment  | 
    A telecommunications or    information handling equipment that embodies a CCI component or CCI assembly    and performs the entire COMSEC function without dependence on host equipment    to operate.   | 
    
  | 
  |
controlled interface  | 
    A boundary with a set of    mechanisms that enforces the security policies and controls the flow of    information between interconnected information systems.   | 
    
  | 
  |
controlled space  | 
    Three-dimensional space surrounding information system equipment, within which unauthorized individuals are denied unrestricted access and are either escorted by authorized individuals or are under continuous physical or electronic surveillance.  | 
    
  | 
  |
controlled unclassified information (CUI)  | 
    Information that requires    safeguarding or dissemination controls pursuant to and consistent with law,    regulations, and government-wide policies, excluding information that is    classified under Executive Order 13526, Classified National Security    Information, December 29, 2009, or any predecessor or successor order, or the    Atomic Energy Act of 1954, as amended.   | 
    
  | 
  |
controlled   | 
    The online repository of    information and policy regarding how authorized holders of CUI should handle    such information.   | 
    
  | 
  |
controlling authority (CONAUTH)  | 
    The official responsible for    directing the operation of a cryptonet using traditional key and for managing    the operational use and control of keying material assigned to the cryptonet.   | 
    
  | 
  |
controlling domain  | 
    The domain that assumes the greater risk and thus enforces the most restrictive policy.  | 
    
  | 
  |
cookie  | 
    A piece of state information    supplied by a Web server to a browser, in a response for a requested    resource, for the browser to store temporarily and return to the server on    any subsequent visits or requests.   | 
    
  | 
  |
cooperative key generation (CKG)  | 
    Electronically exchanging functions of locally generated, random components, from which both terminals of a secure circuit construct traffic encryption key or key encryption key for use on that circuit. See per-call key.  | 
    
  | 
  |
cooperative remote rekeying  | 
    Synonymous with manual remote rekeying.  | 
    
  | 
  |
correctness proof  | 
    A mathematical proof of consistency between a specification and its implementation.  | 
    
  | 
  |
counterintelligence  | 
    Counterintelligence means    information gathered and activities conducted to identify, deceive, exploit,    disrupt, or protect against espionage, other intelligence activities,    sabotage, or assassinations conducted for or on behalf of foreign powers,    organizations, or persons, or their agents, or international terrorist    organizations or activities.   | 
    
  | 
  |
countermeasures  | 
    Actions, devices, procedures,    techniques, or other measures that reduce the vulnerability of an information    system. Synonymous with security controls and safeguards.   | 
    
  | 
  |
courier  | 
    A duly authorized and    trustworthy individual who has been officially designated to transport/carry    material, and if the material is classified, is cleared to the level of    material being transported.   | 
    
  | 
  |
course of action (risk response)  | 
    A time-phased or    situation-dependent combination of risk response measures. See risk response.   | 
    
  | 
  |
cover (TRANSEC)  | 
    Result of measures used to    obfuscate message externals to resist traffic analysis.   | 
    
  | 
  |
coverage  | 
    An attribute associated with    an assessment method that addresses the scope or breadth of the assessment    objects included in the assessment (e.g., types of objects to be assessed and    the number of objects to be assessed by type). The values for the coverage    attribute, hierarchically from less coverage to more coverage, are basic,    focused, and comprehensive.   | 
    
  | 
  |
covert channel  | 
    An unintended or unauthorized    intra-system channel that enables two cooperating entities to transfer    information in a way that violates the system's security policy but does not    exceed the entities' access authorizations.   | 
    
  | 
  |
covert channel analysis  | 
    Determination of the extent to which the security policy model and subsequent lower-level program descriptions may allow unauthorized access to information.  | 
    
  | 
  |
covert storage channel  | 
    A system feature that enables    one system entity to signal information to another entity by directly or    indirectly writing a storage location that is later directly or indirectly    read by the second entity. See: covert channel.   | 
    
  | 
  |
covert timing channel  | 
    A system feature that enables    one system entity to signal information to another by modulating its own use    of a system resource in such a way as to affect system response time observed    by the second entity. See: covert channel.   | 
    
  | 
  |
credential  | 
    
 1. 1. Evidence or testimonials that support a claim of identity or assertion of an attribute and usually are intended to be used more than once. 2. 2. Evidence attesting to one’s right to credit or authority. Source: FIPS PUB 201-1  Source: NIST SP 800-63-2  | 
    
  | 
  |
credential service provider (CSP)  | 
    A trusted entity that issues    or registers subscriber tokens and issues electronic credentials to    subscribers. The CSP may encompass registration authorities (RAs) and    verifiers that it operates. A CSP may be an independent third party, or may    issue credentials for its own use.   | 
    
  | 
  |
critical component  | 
    A component which is or    contains information and communications technology (ICT), including hardware,    software, and firmware, whether custom, commercial, or otherwise developed,    and which delivers or protects mission critical functionality of a system or    which, because of the system’s design, may introduce vulnerability to the    mission critical functions of an applicable system.   | 
    
  | 
  |
critical infrastructure  | 
    System and assets, whether physical or virtual, so vital to the U.S. that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.  | 
    
  | 
  |
critical infrastructure sectors  | 
    Information technology;    telecommunications; chemical; transportation systems, including mass transit,    aviation, maritime, ground/surface, and rail and pipeline systems; emergency    services; and postal and shipping.   | 
    
  | 
  |
critical security parameter  | 
    Security-related information    (e.g., secret and private cryptographic keys, and authentication data such as    passwords and personal identification numbers (PINs)) whose disclosure or    modification can compromise the security of a cryptographic module.   | 
    
  | 
  |
criticality  | 
    A measure of the degree to    which an organization depends on the information or information system for    the success of a mission or of a business function.   | 
    
  | 
  |
criticality analysis  | 
    An end-to-end functional    decomposition performed by systems engineers to identify mission critical    functions and components. Includes identification of system missions,    decomposition into the functions to perform those missions, and traceability    to the hardware, software, and firmware components that implement those    functions. Criticality is assessed in terms of the impact of function or    component failure on the ability of the component to complete the system    missions(s).   | 
    
  | 
  |
criticality level  | 
    Refers to the (consequences of) incorrect behavior of a system. The more serious the expected direct and indirect effects of incorrect behavior, the higher the criticality level.  | 
    
  | 
  |
cross certificate  | 
    A certificate issued from a    certificate authority (CA) that signs the public key of another CA not within    its trust hierarchy that establishes a trust relationship between the two    CAs.   | 
    
  | 
  |
cross domain  | 
    The act of manually and/or    automatically accessing and/or transferring information between different    security domains.   | 
    
  | 
  |
cross domain baseline list  | 
    A list managed by the unified    cross domain services management office (UCDSMO) that identifies CDSs that    are available for deployment within the Department of Defense (DoD) and    intelligence community (IC).   | 
    
  | 
  |
cross domain capabilities  | 
    The set of functions that enable the transfer of information between security domains in accordance with the policies of the security domains involved.  | 
    
  | 
  |
cross domain enabled  | 
    Applications/services that exist on and are capable of interacting across two or more different security domains.  | 
    
  | 
  |
cross domain portal  | 
    A single web-site providing access to cross domain services.  | 
    
  | 
  |
cross domain service  | 
    Services that provide access and/or transfer of information between different security domains.  | 
    
  | 
  |
cross domain solution (CDS)  | 
    A form of controlled    interface that provides the ability to manually and/or automatically access    and/or transfer information between different security domains.   | 
    
  | 
  |
cross domain solution (CDS) filtering  | 
    The process of inspecting data as it traverses a cross domain solution and determines if the data meets pre-defined policy.  | 
    
  | 
  |
cross domain sunset list  | 
    A list managed by the unified    cross domain services management office (UCDSMO) that identifies cross domain    solutions (CDSs) that are or have been in operation, but are no longer    available for additional deployment and need to be replaced within a specified    period of time.   | 
    
  | 
  |
cross-certificate  | 
    1. A certificate used to    establish a trust relationship between two certification   | 
    
  | 
  |
cryptanalysis  | 
    1. Operations performed in    defeating cryptographic protection without an initial knowledge of the key    employed in providing the protection.   | 
    
  | 
  |
CRYPTO  | 
    The marking or designator    identifying unencrypted COMSEC keying material used to secure or authenticate    telecommunications carrying classified or sensitive U.S. Government or U.S.    Government-derived information. This includes non-split keying material used    to encrypt/decrypt COMSEC critical software and software based algorithms.   | 
    
  | 
  |
cryptographic  | 
    Pertaining to, or concerned    with, cryptography.   | 
    
  | 
  |
cryptographic alarm  | 
    Circuit or device that detects failures or aberrations in the logic or operation of cryptographic equipment. Crypto-alarm may inhibit transmission or may provide a visible and/or audible alarm.  | 
    
  | 
  |
cryptographic algorithm (crypto-algorithm)  | 
    1. A well-defined    computational procedure that takes variable inputs, including a cryptographic    key, and produces an output.   | 
    
  | 
  |
cryptographic ancillary equipment (crypto-ancillary equipment)  | 
    Equipment designed    specifically to facilitate efficient or reliable operation of cryptographic    equipment, but which does not itself perform cryptographic functions.   | 
    
  | 
  |
cryptographic binding  | 
    Associating two or more related elements of information using cryptographic techniques.  | 
    
  | 
  |
cryptographic boundary  | 
    Explicitly defined continuous    perimeter that establishes the physical and/or logical bounds of a    cryptographic module and contains all the hardware, software, and/or firmware    components of a cryptographic module.   | 
    
  | 
  |
cryptographic component  | 
    The hardware or firmware    embodiment of the cryptographic logic in a secure telecommunications or    automated information processing system. A cryptographic component may be a    modular assembly, a printed wiring assembly (PWA), a microcircuit, or a    combination of these items.   | 
    
  | 
  |
cryptographic equipment (cryptoequipment)  | 
    Equipment that embodies a    cryptographic logic.   | 
    
  | 
  |
cryptographic erase  | 
    A method of sanitization in    which the media encryption key (MEK) for the encrypted Target Data is    sanitized, making recovery of the decrypted Target Data infeasible.   | 
    
  | 
  |
cryptographic high value product (CHVP)  | 
    NSA-approved products    incorporating only UNCLASSIFIED components and UNCLASSIFIED cryptographic    algorithms. This does include COTS, products approved by NSA, but does not    include composed commercial solutions or their components, unless an    individual component has been approved as a CHVP. Unkeyed CHVPs are not    classified or designated as controlled cryptographic item (CCI).   | 
    
  | 
  |
cryptographic ignition key (CIK)  | 
    Device or electronic key used    to unlock the secure mode of cryptographic equipment.   | 
    
  | 
  |
cryptographic incident  | 
    Any uninvestigated or    unevaluated equipment malfunction or operator or COMSEC Account Manager error    that has the potential to jeopardize the cryptographic security of a machine,    off-line manual cryptosystem OR any investigated or evaluated occurrence that    has been determined as not jeopardizing the cryptographic security of a    cryptosystem.   | 
    
  | 
  |
cryptographic initialization  | 
    Function used to set the state of a cryptographic logic prior to key generation, encryption, or other operating mode.  | 
    
  | 
  |
cryptographic logic  | 
    The embodiment of one (or    more) cryptographic algorithm(s) along with alarms, checks, and other    processes essential to effective and secure performance of the cryptgraphic    process(es).   | 
    
  | 
  |
cryptographic material    (cryptomaterial)   | 
    All material, including    documents, devices, or equipment that contains cryptographic information and    is essential to the encryption, decryption, or authentication of    telecommunications.   | 
    
  | 
  |
cryptographic net (cryptonet)  | 
    Stations that hold a common    key.   | 
    
  | 
  |
cryptographic period (cryptoperiod)  | 
    The time span during which    each key setting remains in effect.   | 
    
  | 
  |
cryptographic product  | 
    A cryptographic key (public, private, or shared) or public key certificate, used for encryption, decryption, digital signature, or signature verification; and other items, such as compromised key lists (CKL) and certificate revocation lists (CRL), obtained by trusted means from the same source which validate the authenticity of keys or certificates. Protected software which generates or regenerates keys or certificates may also be considered a cryptographic product.  | 
    
  | 
  |
cryptographic randomization  | 
    Function that randomly determines the transmit state of a cryptographic logic.  | 
    
  | 
  |
cryptographic security (cryptosecurity)  | 
    Component of COMSEC that    results from the provision of technically sound cryptographic systems and    their proper use.   | 
    
  | 
  |
cryptographic solution  | 
    The generic term for a    cryptographic device, COMSEC equipment, or combination of such    devices/equipment containing either a classified algorithm or an unclassified    algorithm.   | 
    
  | 
  |
cryptographic synchronization  | 
    Process by which a receiving decrypting cryptographic logic attains the same internal state as the transmitting encrypting logic.  | 
    
  | 
  |
cryptology  | 
    The mathematical science that deals with cryptanalysis and cryptography.  | 
    
  | 
  |
cryptonet evaluation report  | 
    A free form message from the    electronic key management system (EKMS) Tier 1 that includes the Controlling    Authority’s ID and Name, Keying Material Information, Description/Cryptonet    Name, Remarks, and Authorized User Information.   | 
    
  | 
  |
cyber incident  | 
    Actions taken through the use of an information system or network that result in an actual or potentially adverse effect on an information system, network, and/or the information residing therein. See incident. See also event, security-relevant event, and intrusion.  | 
    
  | 
  |
cybersecurity  | 
    Prevention of damage to,    protection of, and restoration of computers, electronic communications    systems, electronic communications services, wire communication, and    electronic communication, including information contained therein, to ensure    its availability, integrity, authentication, confidentiality, and    nonrepudiation.   | 
    
  | 
  |
cyberspace  | 
    The interdependent network of    information technology infrastructures, and includes the Internet, telecommunications    networks, computer systems, and embedded processors and controllers in    critical industries.   | 
    
  | 
  |
cyberspace attack  | 
    Cyberspace actions that    create various direct denial effects (i.e. degradation, disruption, or    destruction) and manipulation that leads to denial that is hidden or that    manifests in the physical domains.   | 
    
  | 
  |
cyberspace capability  | 
    A device, computer program,    or technique, including any combination of software, firmware, or hardware,    designed to create an effect in or through cyberspace.   | 
    
  | 
  |
cyberspace defense  | 
    Actions normally created    within DoD cyberspace for securing, operating, and defending the DoD    information networks. Specific actions include protect, detect, characterize,    counter, and mitigate.   | 
    
  | 
  |
cyberspace operations (CO)  | 
    The employment of cyberspace    capabilities where the primary purpose is to achieve objectives in or through    cyberspace.   | 
    
  | 
  |
cyberspace superiority  | 
    The degree of dominance in    cyberspace by one force that permits   | 
    
  | 
  |
cyclic redundancy check (CRC)  | 
    A type of checksum algorithm    that is not a cryptographic hash but is used to implement data integrity    service where accidental changes to data are expected.   | 
    
  | 
  |
data  | 
    Information in a specific    representation, usually as a sequence of symbols that have meaning.   | 
    
  | 
  |
data aggregation  | 
    Compilation of individual data systems and data that could result in the totality of the information being classified, or classified at a higher level, or of beneficial use to an adversary.  | 
    
  | 
  |
data asset  | 
    1. Any entity that is    comprised of data. For example, a database is a data asset that is comprised    of data records. A data asset may be a system or application output file,    database, document, or web page. A data asset also includes a service that    may be provided to access data from an application. For example, a service    that returns individual records from a database would be a data asset.    Similarly, a web site that returns data in response to specific queries    (e.g., www.weather.com) would be a data asset.   | 
    
  | 
  |
data element  | 
    A basic unit of information    that has a unique meaning and subcategories (data items) of distinct value.    Examples of data elements include gender, race, and geographic location.   | 
    
  | 
  |
data flow control  | 
    See with information flow control.  | 
    
  | 
  |
data governance  | 
    A set of processes that    ensures that data assets are formally managed throughout the enterprise. A    data governance model establishes authority and management and decision    making parameters related to the data produced or managed by the enterprise.   | 
    
  | 
  |
data integrity  | 
    The property that data has    not been altered in an unauthorized manner. Data integrity covers data in    storage, during processing, and while in transit.   | 
    
  | 
  |
data loss  | 
    The exposure of proprietary,    sensitive, or classified information through either data theft or data    leakage.   | 
    
  | 
  |
data loss prevention  | 
    A systems ability to    identify, monitor, and protect data in use (e.g. endpoint actions), data in    motion (e.g. network actions), and data at rest (e.g. data storage) through    deep packet content inspection, contextual security analysis of transaction    (attributes of originator, data object, medium, timing,    recipient/destination, etc.), within a centralized management framework. Data    loss prevention capabilities are designed to detect and prevent the    unauthorized use and transmission of NSS information.   | 
    
  | 
  |
data mining  | 
    An analytical process that    attempts to find correlations or patterns in large data sets for the purpose    of data or knowledge discovery.   | 
    
  | 
  |
data origin authentication  | 
    The corroboration that the    source of data received is as claimed.   | 
    
  | 
  |
may be used to trace the    origin of a piece of information processed by community resources.   | 
  |||
data spillage  | 
    See spillage.  | 
  ||
data tag  | 
    A non-hierarchical keyword or    term assigned to a piece of information which helps describe an item and    allows it to be found or processed automatically.   | 
  ||
data transfer device (DTD) (COMSEC)  | 
    Fill device designed to    securely store, transport, and transfer electronically both COMSEC and    TRANSEC key, designed to be backward compatible with the previous generation    of COMSEC common fill devices, and programmable to support modern mission    systems.   | 
  ||
data transfer solution  | 
    Interconnect networks or    information systems that operate in different security domains and transfer    data between them.   | 
  ||
decertification  | 
    Revocation of the certification of an information system item or equipment for cause.  | 
  ||
decipher  | 
    Convert enciphered text to plain text by means of a cryptographic system.  | 
  ||
decode  | 
    Convert encoded data back to    its original form of representation.   | 
  ||
decrypt  | 
    A generic term encompassing    decoding and deciphering.   | 
  ||
default classification  | 
    Classification reflecting the highest classification being processed in an information system. Default classification is included in the caution statement affixed to an object.  | 
  ||
defense-in-breadth  | 
    A planned, systematic set of multi-disciplinary activities that seek to identify, manage, and reduce risk of exploitable vulnerabilities at every stage of the system, network, or sub-component lifecycle (system, network, or product design and development; manufacturing; packaging; assembly; system integration; distribution; operations; maintenance; and retirement).  | 
  ||
defense-in-depth  | 
    Information Security strategy    integrating people, technology, and operations capabilities to establish    variable barriers across multiple layers and missions of the organization.   | 
  ||
defensive cyberspace operations (DCO)  | 
    Passive and active cyberspace    operations intended to preserve the ability to utilize friendly cyberspace    capabilities and protect data, networks, net-centric capabilities, and other    designated systems.   | 
  ||
defensive cyberspace operation response action (DCO-RA)  | 
    Deliberate, authorized    defensive measures or activities taken outside of the defended network to    protect and defend Department of Defense (DoD) cyberspace capabilities or    other designated systems.   | 
  ||
degauss  | 
    To reduce the magnetic flux    to virtual zero by applying a reverse magnetizing field. Also called    demagnetizing.   | 
  ||
deleted file  | 
    A file that has been    logically, but not necessarily physically, erased from the operating system,    perhaps to eliminate potentially incriminating evidence. Deleting files does    not always necessarily eliminate the possibility of recovering all or part of    the original data.   | 
  ||
delivery-only client (DOC) (C.F.D.)  | 
    A configuration of a client    node that enables a DOA agent to access a primary services node (PRSN) to    retrieve KMI products and access KMI services. A DOC consists of a client    platform but does not include an AKP.   | 
  ||
demilitarize  | 
    The process of preparing    National Security System equipment for disposal by extracting all CCI,    classified, or CRYPTO-marked components for their secure destruction, as well    as defacing and disposing of the remaining equipment hulk.   | 
  ||
demilitarized zone (DMZ)  | 
    1. Perimeter network segment    that is logically between internal and external networks. Its purpose is to    enforce the internal network’s Information Assurance (IA) policy for external    information exchange and to provide external, untrusted sources with    restricted access to releasable information while shielding the internal    networks from outside attacks.   | 
  ||
denial of service (DoS)  | 
    The prevention of authorized    access to resources or the delaying of time- critical operations.    (Time-critical may be milliseconds or it may be hours, depending upon the    service provided.)   | 
  ||
Department of Defense information network operations  | 
    Operations to design, build,    configure, secure, operate, maintain, and sustain Department of Defense    networks to create and preserve information assurance on the Department of    Defense information networks.   | 
  ||
Department of Defense information networks (DODIN)  | 
    The globally interconnected,    end-to-end set of information capabilities, and associated processes for    collecting, processing, storing, disseminating, and managing information    on-demand to warfighters, policy makers, and support personnel, including    owned and leased communications and computing systems and services, software    (including applications), data, security services, other associated services,    and national security systems.   | 
  ||
depth  | 
    An attribute associated with    an assessment method that addresses the rigor and level of detail associated    with the application of the method. The values for the depth attribute,    hierarchically from less depth to more depth, are basic, focused, and    comprehensive.   | 
  ||
derived credential  | 
    A credential issued based on    proof of possession and control of a token associated with a previously    issued credential, so as not to duplicate the identity proofing process.   | 
  ||
designated approval authority   | 
    Official with the authority    to formally assume responsibility for operating a system at an acceptable    level of risk. This term is synonymous with authorizing official, designated    accrediting authority, and delegated accrediting authority.   | 
  ||
destroy  | 
    A method of sanitization that    renders Target Data recovery infeasible using state of the art laboratory    techniques and results in the subsequent inability to use the media for    storage of data.   | 
  ||
developer  | 
    A general term that includes:    (i) developers or manufacturers of information systems, system components, or    information system services; (ii) systems integrators; (iii) vendors; (iv)    and product resellers. Development of systems, components, or services can    occur internally within organizations (i.e., in-house development) or through    external entities.   | 
  ||
device distribution profile  | 
    An approval-based access control list (ACL) for a specific product that 1) names the user devices in a specific KMI operating account (KOA) to which primary services nodes (PRSNs) distribute the product and 2) states conditions of distribution for each device.  | 
  ||
device registration manager  | 
    The management role that is responsible for performing activities related to registering users that are devices.  | 
  ||
digital forensics  | 
    In its strictest connotation,    the application of computer science and investigative procedures involving    the examination of digital evidence - following proper search authority,    chain of custody, validation with mathematics, use of validated tools, repeatability,    reporting, and possibly expert testimony.   | 
  ||
digital media  | 
    A form of electronic media    where data are stored in digital (as opposed to analog) form.   | 
  ||
digital signature  | 
    The result of a cryptographic    transformation of data that, when properly implemented, provides the services    of: 1. origin authentication, 2. data integrity, and 3. signer    non-repudiation.   | 
  ||
direct BLACK wireline  | 
    A BLACK metallic wireline    that directly leaves the inspectable space in a continuous electrical path    with no signal interruption or isolation. Continuous wirelines may be patched    or spliced. Examples of wirelines that directly leave the inspectable space    are analog telephone lines, commercial television cables, and alarm lines.    Wirelines that do not leave the inspectable space are wirelines that pass    through a digital switch or converter that reestablishes the signal level or    reformats the signaling. Examples of BLACK wirelines that do not directly    leave the inspectable space are telephone lines that connect to digital    telephone switches, Ethernet lines that connect to digital network routers    and alarm lines that connect to an alarm panel.   | 
  ||
directory service (D/S)  | 
    Repository of account    registration.   | 
  ||
dirty word list  | 
    List of words that have been pre-defined as being unacceptable for transmission and may be used in conjunction with a clean word list to avoid false negatives (e.g., secret within secretary).  | 
  ||
disaster recovery plan (DRP)  | 
    1. Management policy and    procedures used to guide an enterprise response to a major loss of enterprise    capability or damage to its facilities. The DRP is the second plan needed by    the enterprise risk managers and is used when the enterprise must recover (at    its original facilities) from a loss of capability over a period of hours or    days. See continuity of operations plan (COOP) and contingency plan.   | 
  ||
(DAC)  | 
    An access control policy that    is enforced over all subjects and objects in an information system where the    policy specifies that a subject that has been granted access to information    can do one or more of the following: (i) pass the information to other    subjects or objects; (ii) grant its privileges to other subjects; (iii) change    security attributes on subjects, objects, information systems, or system    components; (iv) choose the security attributes to be associated with    newly-created or revised objects; or (v) change the rules governing access    control. Mandatory access controls restrict this capability.   | 
  ||
disruption  | 
    An unplanned event that    causes the general system or major application to be inoperable for an    unacceptable length of time (e.g., minor or extended power outage, extended    unavailable network, or equipment or facility damage or destruction).   | 
  ||
distinguished name (DN)  | 
    An identifier that uniquely    represents an object in the X.500 directory information tree.   | 
  ||
distinguishing identifier  | 
    Information which    unambiguously distinguishes an entity in the authentication process.   | 
  ||
distributed denial of service (DDoS)  | 
    A denial of service technique that uses numerous hosts to perform the attack.  | 
  ||
DoD information  | 
    Any information that has not    been cleared for public release in accordance with Department of Defense    (DoD) Directive 5230.09, “Clearance of DoD Information for Public Release”,    and that has been collected, developed, received, transmitted, used, or    stored by DoD, or by a non-DoD entity in support of an official DoD activity.   | 
  ||
domain  | 
    An environment or context    that includes a set of system resources and a set of system entities that    have the right to access the resources as defined by a common security    policy, security model, or security architecture. See security domain.   | 
  ||
dynamic subsystem  | 
    A subsystem that is not    continually present during the execution phase of an information system.    Service-oriented architectures and cloud computing architectures are examples    of architectures that employ dynamic subsystems.   | 
  ||
e-government (e-gov) (C.F.D.)  | 
    The use by the U.S.    Government of web-based Internet applications and other information    technology.   | 
  ||
effective period  | 
    Time span during which each    COMSEC key edition (i.e., multiple key segments) remains in effect.   | 
  ||
electronic authentication (e- authentication)  | 
    The process of establishing    confidence in user identities electronically presented to an information    system.   | 
  ||
electronic business (e-business) (C.F.D.)  | 
    Doing business online.   | 
  ||
electronic credentials  | 
    Digital documents used in authentication that bind an identity or an attribute to a subscriber's authenticator.  | 
  ||
electronic fill device (EFD)  | 
    A COMSEC item used to    transfer or store key in electronic form or to insert key into cryptographic    equipment.   | 
  ||
electronic key management system (EKMS)  | 
    An interoperable collection    of systems that automate the planning, ordering, generating, distributing,    storing, filling, using, and destroying of electronic key and management of    other types of COMSEC material.   | 
  ||
electronic messaging services  | 
    Services providing interpersonal messaging capability; meeting specific functional, management, and technical requirements; and yielding a business- quality electronic mail service suitable for the conduct of official government business.  | 
  ||
electronic signature (C.F.D.)  | 
    See digital signature.   | 
  ||
electronically generated key  | 
    Key generated in a COMSEC device by introducing (either mechanically or electronically) a seed key into the device and then using the seed, together with a software algorithm stored in the device, to produce the desired key.  | 
  ||
emission security (EMSEC)  | 
    The component of    communications security that results from all measures taken to deny    unauthorized persons information of value that might be derived from    intercept and analysis of compromising emanations from cryptoequipment and    information systems. See TEMPEST.   | 
  ||
embedded computer (C.F.D.)  | 
    Computer system that is an    integral part of a larger system.   | 
  ||
emergency action plan (EAP)  | 
    A plan developed to prevent    loss of national intelligence; protect personnel, facilities, and    communications; and recover operations damaged by terrorist attack, natural    disaster, or similar events.   | 
  ||
encipher  | 
    See encrypt.   | 
  ||
encryption certificate  | 
    A certificate containing a    public key that can encrypt or decrypt electronic messages, files, documents,    or data transmissions, or establish or exchange a session key for these same purposes.    Key management sometimes refers to the process of storing protecting and    escrowing the private component of the key pair associated with the    encryption certificate.   | 
  ||
enclave  | 
    A set of system resources    that operate in the same security domain and that share the protection of a    single, common, continuous security perimeter.   | 
  ||
enclave boundary  | 
    Point at which an enclave’s internal network service layer connects to an external network’s service layer, i.e., to another enclave or to a wide area network (WAN).  | 
  ||
encode  | 
    Use a system of symbols to    represent information, which might originally have some other representation.    Example: Morse code.   | 
  ||
encrypt  | 
    Cryptographically transform    data to produce cipher text.   | 
  ||
encrypted key  | 
    Key that has been encrypted    in a system approved by the National Security Agency (NSA) for key    encryption.   | 
  ||
encryption  | 
    The cryptographic    transformation of data to produce ciphertext.   | 
  ||
encryption algorithm  | 
    Set of mathematically expressed rules for rendering data unintelligible by executing a series of conversions controlled by a key.  | 
  ||
encryption certificate  | 
    A certificate containing a    public key that can encrypt or decrypt electronic messages, files, documents,    or data transmissions, or establish or exchange a session key for these same    purposes. Key management sometimes refers to the process of storing    protecting and escrowing the private component of the key pair associated    with the encryption certificate.   | 
  ||
end cryptographic unit (ECU)  | 
    Device that 1) performs cryptographic functions, 2) typically is part of a larger system for which the device provides security services, and 3) from the viewpoint of a supporting security infrastructure (e.g., a key management system) is the lowest level of identifiable component with which a management transaction can be conducted.  | 
  ||
end-item accounting  | 
    Accounting for all the    accountable components of a COMSEC equipment configuration by a single short    title.   | 
  ||
end-to-end encryption  | 
    Communications encryption in    which data is encrypted when being passed through a network, but routing    information remains visible.   | 
  ||
end-to-end security  | 
    Safeguarding information in an information system from point of origin to point of destination.  | 
  ||
enrollment manager  | 
    The management role that is responsible for assigning user identities to management and non-management roles.  | 
  ||
enterprise  | 
    An organization with a defined mission/goal and a defined boundary, using information systems to execute that mission, and with responsibility for managing its own risks and performance. An enterprise may consist of all or some of the following business aspects: acquisition, program management, financial management (e.g., budgets), human resources, security, and information systems, information and mission management.  | 
  ||
enterprise architecture (EA)  | 
    A strategic information asset    base that defines the mission, the information necessary to perform the    mission, the technologies necessary for performing the mission, and the    transitional process for implementing new technologies in response to    changing mission needs. The EA includes a baseline architecture, target    architecture, and sequencing plan.   | 
  ||
enterprise cross domain services (ECDS)  | 
    A cross domain solution    provided as a system across an enterprise infrastructure, fully integrated to    provide the ability to access or transfer information between two or more    security domains.   | 
  ||
enterprise cross domain services (ECDS) provider  | 
    An organization that    establishes, manages and maintains the overall infrastructure and security    posture offering automated capabilities to users and applications within an    enterprise environment for information sharing across and among security    domains.   | 
  ||
enterprise-hosted cross domain solutions  | 
    A point-to-point cross domain    solution (CDS) that is managed by an enterprise cross domain service (ECDS)    provider that may be available to additional users within the enterprise with    little or no modifications.   | 
  ||
enterprise risk management  | 
    The methods and processes used by an enterprise to manage risks to its mission and to establish the trust necessary for the enterprise to support shared missions. It involves the identification of mission dependencies on enterprise capabilities, the identification and prioritization of risks due to defined threats, the implementation of countermeasures to provide both a static risk posture and an effective dynamic response to active threats; and it assesses enterprise performance against threats and adjusts countermeasures as necessary  | 
  ||
enterprise service  | 
    A set of one or more computer applications and middleware systems hosted on computer hardware that provides standard information systems capabilities to end users and hosted mission applications and services.  | 
  ||
environment of operation  | 
    The physical, technical, and    organizational setting in which an information system operates, including but    not limited to: missions/business functions; mission/business processes;    threat space; vulnerabilities; enterprise and information security architectures;    personnel; facilities; supply chain relationships; information technologies;    organizational governance and culture; acquisition and procurement processes;    organizational policies and procedures; organizational assumptions,    constraints, risk tolerance, and priorities/trade-offs).   | 
  ||
erasure  | 
    Process intended to render    magnetically stored information irretrievable by normal means.   | 
  ||
error detection code  | 
    A code computed from data and    comprised of redundant bits of information designed to detect, but not    correct, unintentional changes in the data.   | 
  ||
evaluated products list (EPL) (C.F.D.)  | 
    List of validated products    that have been successfully evaluated under the National Information    Assurance Partnership (NIAP) Common Criteria Evaluation and Validation Scheme    (CCEVS).   | 
  ||
evaluating authority  | 
    The official responsible for    evaluating a reported COMSEC incident for the possibility of compromise.   | 
  ||
evaluation assurance level (EAL) (C.F.D.)  | 
    Set of assurance requirements    that represent a point on the Common Criteria predefined assurance scale.   | 
  ||
event  | 
    Any observable occurrence in    a network or system.   | 
  ||
examine  | 
    A type of assessment method    that is characterized by the process of checking, inspecting, reviewing,    observing, studying, or analyzing one or more assessment objects to    facilitate understanding, achieve clarification, or obtain evidence, the    results of which are used to support the determination of security control    effectiveness over time.   | 
  ||
executive agency  | 
    An executive department    specified in 5 U.S.C., Sec. 101; a military department specified in 5 U.S.C.,    Sec. 102; an independent establishment as defined in 5 U.S.C., Sec. 104(1);    and a wholly owned Government corporation fully subject to the provisions of    31 U.S.C., Chapter 91.   | 
  ||
exfiltration  | 
    The unauthorized transfer of    information from an information system.   | 
  ||
expected output  | 
    Any data collected from    monitoring and assessments as part of the information security continuous    monitoring (ISCM) strategy.   | 
  ||
exploitable channel  | 
    Channel that allows the violation of the security policy governing an information system and is usable or detectable by subjects external to the trusted computing base. See covert channel.  | 
  ||
eXtensible configuration checklist description format (XCCDF)  | 
    A language for authoring    security checklists/benchmarks and for reporting results of evaluating them.   | 
  ||
external information system (or component)  | 
    An information system or    component of an information system that is outside of the authorization    boundary established by the organization and for which the organization    typically has no direct control over the application of required security    controls or the assessment of security control effectiveness.   | 
  ||
external information system service  | 
    An information system service    that is implemented outside of the authorization boundary of the    organizational information system (i.e., a service that is used by, but not a    part of, the organizational information system) and for which the    organization typically has no direct control over the application of required    security controls or the assessment of security control effectiveness.   | 
  ||
external information system service provider  | 
    A provider of external information    system services to an organization through a variety of consumer-producer    relationships, including but not limited to: joint ventures; business    partnerships; outsourcing arrangements (i.e., through contracts, interagency    agreements, lines of business arrangements); licensing agreements; and/or    supply chain exchanges.   | 
  ||
external network  | 
    A network not controlled by    the organization.   | 
  ||
external operational management role  | 
    A role intended to be    performed by a manager who is typically a member of a key management    infrastructure (KMI) customer organization.   | 
  ||
extranet  | 
    A computer network that an    organization uses for application data traffic between the organization and    its business partners.   | 
  ||
fail safe  | 
    A mode of termination of    system functions that prevents damage to specified system resources and    system entities (i.e., specified data, property, and life) when a failure    occurs or is detected in the system (but the failure still might cause a    security compromise).   | 
  ||
fail secure  | 
    A mode of termination of    system functions that prevents loss of secure state when a failure occurs or    is detected in the system (but the failure still might cause damage to some    system resource or system entity).   | 
  ||
fail soft  | 
    Selective termination of    affected, non-essential system functions when a failure occurs or is detected    in the system.   | 
  ||
failover  | 
    The capability to switch over    automatically (typically without human intervention or warning) to a    redundant or standby information system upon the failure or abnormal    termination of the previously active system.   | 
  ||
failure access  | 
    Type of incident in which unauthorized access to data results from hardware or software failure.  | 
  ||
failure control  | 
    Methodology used to detect imminent hardware or software failure and provide fail safe or fail soft recovery.  | 
  ||
false acceptance  | 
    When a biometric system    incorrectly identifies a biometric subject or incorrectly authenticates a    biometric subject against a claimed identity.   | 
  ||
false accept rate (FAR)  | 
    Proportion of verification    transactions with wrongful claims of identity that are incorrectly confirmed.   | 
  ||
false rejection  | 
    The failure of a biometric    system to identify a biometric subject or to verify the legitimate claimed    identity of a biometric subject.   | 
  ||
false reject rate (FRR)  | 
    Proportion of verification    transactions with truthful claims of identity that are incorrectly denied.   | 
  ||
fault tree analysis  | 
    A top-down, deductive failure    analysis in which an undesired state of a system (top event) is analyzed    using Boolean logic to combine a series of lower-level events. An analytical    approach whereby an undesired state of a system is specified and the system    is then analyzed in the context of its environment of operation to find all    realistic ways in which the undesired event (top event) can occur.   | 
  ||
federal agency  | 
    See executive agency.   | 
  ||
federal bridge certification authority (FBCA)  | 
    The Federal Bridge    certification authority (CA) consists of a collection of public key    infrastructure (PKI) components (Certificate Authorities, Directories,    Certificate Policies and Certificate Practice Statements) that are used to    provide peer to peer interoperability among Agency Principal Certification    Authorities.   | 
  ||
federal enterprise architecture (FEA)  | 
    A business-based framework    that the Office of Management and Budget (OMB) developed for government-wide    improvement in developing enterprise architectures (EAs) by providing a    common framework to identify opportunities for simplifying processes and    unifying work across the Federal Government.   | 
  ||
federal information    processing   | 
    A standard for adoption and    use by Federal agencies that has been developed within the Information    Technology Laboratory and published by the National Institute of Standards    and Technology, a part of the U.S. Department of Commerce. A FIPS covers some    topic in information technology in order to achieve a common level of quality    or some level of interoperability.   | 
  ||
Federal Information Processing Standards (FIPS)-validated cryptography  | 
    A cryptographic module    validated by the Cryptographic Module Validation Program (CMVP) to meet    requirements specified in FIPS 140-2 (as amended). As a prerequisite to CMVP    validation, the cryptographic module is required to employ a cryptographic    algorithm implementation that has successfully passed validation testing by    the Cryptographic Algorithm Validation Program (CAVP). See NSA-approved    cryptography.   | 
  ||
Federal Information Security   | 
    Title III of the E-Government    Act requiring each federal agency to develop, document, and implement an    agency-wide program to provide information security for the information and    information systems that support the operations and assets of the agency, including    those provided or managed by another agency, contractor, or other source.   | 
  ||
federal information system  | 
    An information system used or    operated by an executive agency, by a contractor of an executive agency, or    by another organization on behalf of an executive agency.   | 
  ||
file protection  | 
    Aggregate of processes and procedures designed to inhibit unauthorized access, contamination, elimination, modification, or destruction of a file or any of its contents.  | 
  ||
fill device  | 
    A COMSEC item used to    transfer or store key in electronic form or to insert key into cryptographic    equipment. The “Common Fill Devices” are the KYK-13, and KYK-15. Electronic    fill devices include, but are not limited to, the DTD, SKL, SDS, and RASKI.   | 
  ||
FIREFLY  | 
    Key management protocol based on public key cryptography.  | 
  ||
FIREFLY credential manager  | 
    The key management entity    (KME) responsible for removing outdated modern key credentials from the    directory servers.   | 
  ||
firewall  | 
    A gateway that limits access    between networks in accordance with local security policy.   | 
  ||
firmware  | 
    Computer programs and data    stored in hardware - typically in read-only memory (ROM) or programmable    read-only memory (PROM) - such that the programs and data cannot be    dynamically written or modified during execution of the programs.   | 
  ||
fixed COMSEC facility  | 
    COMSEC facility located in an    immobile structure or aboard a ship.   | 
  ||
flooding  | 
    An attack that attempts to    cause a failure in a system by providing more input than the system can    process properly.   | 
  ||
focused observation  | 
    The act of directed (focused)    attention to a party or parties alleged to have violated Department/Agency    (D/A) acceptable use' policies and agreements for NSS. The alleged violation    may be caused by the aggregation of triggers indicating anomalous activity on    a National Security System (NSS). The violation thresholds are arrived at by    trigger events that meet established thresholds of anomalous activity or the    observed violation of 'acceptable use' policies.   | 
  ||
focused testing  | 
    A test methodology that    assumes some knowledge of the internal structure and implementation detail of    the assessment object. Also known as gray box testing.   | 
  ||
forensic copy  | 
    An accurate bit-for-bit    reproduction of the information contained on an electronic device or    associated media, whose validity and integrity has been verified using an    accepted algorithm.   | 
  ||
forensics  | 
    The practice of gathering, retaining, and analyzing computer-related data for investigative purposes in a manner that maintains the integrity of the data.  | 
  ||
formal access approval  | 
    A formalization of the    security determination for authorizing access to a specific type of    classified or controlled unclassified information (CUI) categories or subcategories    based on specified access requirements, a determination of the individual’s    security eligibility, and a determination that the individual’s official    duties require the individual be provided access to the information.   | 
  ||
formal method  | 
    Software engineering method    used to specify, develop, and verify the software through application of a    rigorous mathematically based notation and language.   | 
  ||
formal policy model  | 
    A description of specific    behaviors or security policies using formal languages, thus enabling the    correctness of those behaviors/policies to be formally proven.   | 
  ||
frequency hopping  | 
    Repeated switching of frequencies during radio transmission according to a specified algorithm, to minimize unauthorized interception or jamming of telecommunications.  | 
  ||
full/depot maintenance (COMSEC)  | 
    Complete diagnostic repair,    modification, and overhaul of COMSEC equipment, including repair of defective    assemblies by piece part replacement. See limited maintenance.   | 
  ||
functional testing  | 
    Segment of quality assurance testing in which advertised security mechanisms of an information system are tested against a specification.  | 
  ||
gateway  | 
    An intermediate system    (interface, relay) that attaches to two (or more) computer networks that have    similar functions but dissimilar implementations and that enables either    one-way or two-way communication between the networks.   | 
  ||
general support system (GSS)  | 
    An interconnected set of    information resources under the same direct management control that shares    common functionality. It normally includes hardware, software, information,    data, applications, communications, and people.   | 
  ||
global information grid (GIG) (C.F.D.)  | 
    The globally interconnected,    end-to-end set of information capabilities for collecting, processing,    storing, disseminating, and managing information on demand to warfighters,    policy makers, and support personnel. The GIG includes owned and leased    communications and computing systems and services, software (including    applications), data, security services, other associated services, and    National Security Systems. Non-GIG information technology (IT) includes    stand-alone, self-contained, or embedded IT that is not, and will not be,    connected to the enterprise network.   | 
  ||
government off the shelf (GOTS)  | 
    A software and/or hardware    product that is developed by the technical staff of a Government organization    for use by the U.S. Government. GOTS software and hardware may be developed    by an external entity, with specification from the Government organization to    meet a specific Government purpose, and can normally be shared among Federal    agencies without additional cost. GOTS products and systems are not    commercially available to the general public. Sales and distribution of GOTS    products and systems are controlled by the Government.   | 
  ||
gray box testing  | 
    See focused testing.  | 
  ||
gray market  | 
    Distribution channels which,    while legal, are unofficial, unauthorized, or unintended by the original    manufacturer.   | 
  ||
group authenticator  | 
    Used, sometimes in addition to a sign-on authenticator, to allow access to specific data or functions that may be shared by all members of a particular group.  | 
  ||
guard (system)  | 
    A computer system that (a)    acts as gateway between two information systems operating under different    security policies and (b) is trusted to mediate information data transfers    between the two.   | 
  ||
hacker  | 
    Unauthorized user who attempts to or gains access to an information system.  | 
  ||
hand receipt  | 
    A document used to record    temporary transfer of COMSEC material from a COMSEC Account Manager to a user    or maintenance facility and acceptance by the recipient of the responsibility    for the proper storage, control, and accountability of the COMSEC material.   | 
  ||
hand receipt holder  | 
    A user to whom COMSEC    material has been issued a hand receipt. Known in EKMS and KMI as a Local    Element.   | 
  ||
handshake  | 
    Protocol dialogue between two    systems for identifying and authenticating themselves to each other, or for    synchronizing their operations with each other.   | 
  ||
hard copy key  | 
    Physical keying material,    such as printed key lists, punched or printed key tapes, or programmable,    read-only memories (PROMs).   | 
  ||
hardware  | 
    The material physical    components of an information system. See firmware and software.   | 
  ||
hardwired key  | 
    Key that is permanently    installed.   | 
  ||
hash value/result  | 
    See message digest.  | 
  ||
hash-based message authentication code (HMAC)  | 
    A message authentication code    that uses a cryptographic key in conjunction with a hash function.   | 
  ||
hashing  | 
    The process of using a    mathematical algorithm against data to produce a numeric value that is    representative of that data.   | 
  ||
hashword (C.F.D.)  | 
    Memory address containing    hash total.   | 
  ||
High Assurance Internet Protocol Encryptor (HAIPE)  | 
    Device that provides    networking, traffic protection, and management features that provide    information assurance (IA) services in an IPv4/IPv6 network.   | 
  ||
High Assurance Internet Protocol Encryptor Interoperability Specification (HAIPE-IS)  | 
    Suite of documents containing    the traffic protection, networking, and interoperability functional    requirements necessary to ensure the interoperability of HAIPE compliant    devices. This policy applies to HAIPE-IS Version 3.0.2 and all subsequent    HAIPE-IS versions.   | 
  ||
high impact  | 
    The loss of confidentiality,    integrity, or availability that could be expected to have a severe or    catastrophic adverse effect on organizational operations, organizational    assets, individuals, other organizations, or the national security interests    of the United States; (i.e., 1) causes a severe degradation in mission    capability to an extent and duration that the organization is able to perform    its primary functions, but the effectiveness of the functions is    significantly reduced; 2) results in major damage to organizational assets;    3) results in major financial loss; or 4) results in severe or catastrophic    harm to individuals involving loss of life or serious life-threatening    injuries.)   | 
  ||
high-impact system  | 
    An information system in    which at least one security objective (i.e., confidentiality, integrity, or    availability) is assigned a FIPS PUB 199 potential impact value of high.   | 
  ||
high-power transmitter  | 
    For the purposes of    determining separation between RED equipment/lines and RF transmitters,    high-power is that which exceeds 100 m Watt (20dBm) emitted isotropic    radiated power (EIRP). See low-power transmitter.   | 
  ||
honeypot  | 
    A system (e.g., a web server)    or system resource (e.g., a file on a server) that is designed to be    attractive to potential crackers and intruders, like honey is attractive to    bears.   | 
  ||
host  | 
    A host is any hardware device    that has the capability of permitting access to a network via a user    interface, specialized software, network address, protocol stack, or any    other means. Some examples include, but are not limited to, computers,    personal electronic devices, thin clients, and multi-functional devices.   | 
  ||
host-based security  | 
    A set of capabilities that    provide a framework to implement a wide-range of security solutions on hosts.    This framework includes a trusted agent and a centralized management function    that together provide automated protection to detect, respond, and report    host-based vulnerabilities and incidents.   | 
  ||
hot site  | 
    A fully operational offsite    data processing facility equipped with hardware and software, to be used in    the event of an information system disruption.   | 
  ||
hybrid security control  | 
    A security control that is    implemented in an information system in part as a common control and in part    as a system-specific control. See common control and system-specific security    control.   | 
  ||
IA architecture  | 
    A description of the    structure and behavior for an enterprise’s security processes, information    security systems, personnel and organizational sub- units, showing their    alignment with the enterprise’s mission and strategic plans.   | 
  ||
IA infrastructure  | 
    The underlying security    framework that lies beyond an enterprise’s defined boundary, but supports its    information assurance (IA) and IA-enabled products, its security posture and    its risk management plan.   | 
  ||
IA product  | 
    Product whose primary purpose    is to provide security services (e.g., confidentiality, authentication,    integrity, access control, non-repudiation of data); correct known    vulnerabilities; and/or provide layered defense against various categories of    non-authorized or malicious penetrations of information systems or networks.   | 
  ||
IA-enabled information technology product (C.F.D.)  | 
    Product or technology whose    primary role is not security, but which provides security services as an    associated feature of its intended operating capabilities. Examples include    such products as security-enabled web browsers, screening routers, trusted    operating systems, and security-enabled messaging systems.   | 
  ||
IA-enabled product  | 
    Product whose primary role is    not security, but provides security services as an associated feature of its    intended operating capabilities.   | 
  ||
identification  | 
    The process of discovering    the true identity (i.e., origin, initial history) of a person or item from    the entire collection of similar persons or items.   | 
  ||
identifier  | 
    Unique data used to represent    a person’s identity and associated attributes. A name or a card number are    examples of identifiers.   | 
  ||
identity  | 
    The set of physical and    behavioral characteristics by which an individual is uniquely recognizable.   | 
  ||
identity-based access control  | 
    Access control based on the identity of the user (typically relayed as a characteristic of the process acting on behalf of that user) where access authorizations to specific objects are assigned based on user identity.  | 
  ||
identity certificate  | 
    A certificate that provides    authentication of the identity claimed. Within the National Security System    (NSS) public key infrastructure (PKI), identity certificates may be used only    for authentication or may be used for both authentication and digital    signatures.   | 
  ||
Identity, Credential, and Access Management (ICAM)  | 
    Programs, processes,    technologies, and personnel used to create trusted digital identity    representations of individuals and non-person entities (NPEs), bind those    identities to credentials that may serve as a proxy for the individual or NPE    in access transactions, and leverage the credentials to provide authorized    access to an agency‘s resources.   | 
  ||
identity registration  | 
    The process of making a    person’s identity known to the personal identity verification (PIV) system,    associating a unique identifier with that identity, and collecting and    recording the person’s relevant attributes into the system.   | 
  ||
identity token  | 
    Smart card, metal key, or other physical object used to authenticate identity.  | 
  ||
impact  | 
    The effect on organizational    operations, organizational assets, individuals, other organizations, or the    Nation (including the national security interests of the United States) of a    loss of confidentiality, integrity, or availability of information or an    information system.   | 
  ||
impact level  | 
    The magnitude of harm that    can be expected to result from the consequences of unauthorized disclosure of    information, unauthorized modification of information, unauthorized    destruction of information, or loss of information or information system    availability.   | 
  ||
impact value  | 
    The assessed potential impact    resulting from a compromise of the confidentiality, integrity, or    availability of an information type, expressed as a value of low, moderate,    or high.   | 
  ||
implant  | 
    Electronic device or electronic equipment modification designed to gain unauthorized interception of information-bearing emanations.  | 
  ||
inadvertent disclosure  | 
    Type of incident involving accidental exposure of information to an individual not authorized access.  | 
  ||
incident  | 
    An occurrence that results in    actual or potential jeopardy to the confidentiality, integrity, or    availability of an information system or the information the system    processes, stores, or transmits or that constitutes a violation or imminent    threat of violation of security policies, security procedures, or acceptable    use policies. See cyber incident. See also event, security-relevant, and    intrusion.   | 
  ||
incident handling  | 
    The mitigation of violations    of security policies and recommended practices.   | 
  ||
incident response  | 
    See incident handling.  | 
  ||
incident response plan  | 
    The documentation of a    predetermined set of instructions or procedures to detect, respond to, and    limit consequences of a malicious cyber attacks against an organization’s    information systems(s).   | 
  ||
independent validation authority (IVA)  | 
    Entity that reviews the soundness of independent tests and system compliance with all stated security controls and risk mitigation actions. IVAs will be designated by the authorizing official as needed.  | 
  ||
independent verification & validation (IV&V)  | 
    A comprehensive review, analysis, and testing, (software and/or hardware) performed by an objective third party to confirm (i.e., verify) that the requirements are correctly defined, and to confirm (i.e., validate) that the system correctly implements the required functionality and security requirements.  | 
  ||
indicator  | 
    Recognized action, specific, generalized, or theoretical, that an adversary might be expected to take in preparation for an attack.  | 
  ||
individuals  | 
    An assessment object that    includes people applying specifications, mechanisms, or activities.   | 
  ||
individual accountability  | 
    Ability to associate positively the identity of a user with the time, method, and degree of access to an information system.  | 
  ||
industrial control system (ICS)  | 
    General term that encompasses    several types of control systems, including supervisory control and data    acquisition (SCADA) systems, distributed control systems (DCS), and other    control system configurations such as programmable logic controllers (PLC)    often found in the industrial sectors and critical infrastructures. An ICS    consists of combinations of control components (e.g., electrical, mechanical,    hydraulic, pneumatic) that act together to achieve an industrial objective    (e.g., manufacturing, transportation of matter or energy).   | 
  ||
information  | 
    1. Facts and ideas, which can    be represented (encoded) as various forms of data.   | 
  ||
information and communications technology (ICT)  | 
    Includes all categories of    ubiquitous technology used for the gathering, storing, transmitting,    retrieving, or processing of information (e.g., microelectronics, printed    circuit boards, computing systems, software, signal processors, mobile    telephony, satellite communications, and networks).   | 
  ||
information assurance (IA)  | 
    Measures that protect and    defend information and information systems by ensuring their availability,    integrity, authentication, confidentiality, and non- repudiation. These    measures include providing for restoration of information systems by    incorporating protection, detection, and reaction capabilities.   | 
  ||
information assurance (IA) professional (C.F.D.)  | 
    Individual who works IA    issues and has real world experience plus appropriate   | 
  ||
information assurance component (IAC)  | 
    An application (hardware    and/or software) that provides one or more Information Assurance capabilities    in support of the overall security and operational objectives of a system.   | 
  ||
information assurance manager (IAM) (C.F.D.)  | 
    See information systems    security manager (ISSM).   | 
  ||
information assurance officer (IAO) (C.F.D.)  | 
    See information systems    security officer (ISSO).   | 
  ||
information assurance vulnerability alert (IAVA)  | 
    Notification that is    generated when an Information Assurance vulnerability may result in an    immediate and potentially severe threat to DoD systems and information; this    alert requires corrective action because of the severity of the vulnerability    risk.   | 
  ||
information assurance vulnerability bulletin (IAVB)  | 
    Addresses new vulnerabilities    that do not pose an immediate risk to DoD systems, but are significant enough    that noncompliance with the corrective action could escalate the risk.   | 
  ||
information domain  | 
    A three-part concept for information sharing, independent of, and across information systems and security domains that 1) identifies information sharing participants as individual members, 2) contains shared information objects, and 3) provides a security policy that identifies the roles and privileges of the members and the protections required for the information objects.  | 
  ||
information environment  | 
    The aggregate of individuals,    organizations, and systems that collect, process, disseminate, or act on    information.   | 
  ||
information flow control  | 
    Procedure to ensure that information transfers within an information system are not made in violation of the security policy.  | 
  ||
information management  | 
    The planning, budgeting, manipulating, and controlling of information throughout its life cycle.  | 
  ||
information operations (IO)  | 
    The integrated employment,    during military operations, of information-related capabilities in concert    with other lines of operation to influence, disrupt, corrupt, or usurp the decision-making    of adversaries and potential adversaries while protecting our own. Also    called IO.   | 
  ||
information owner  | 
    Official with statutory or    operational authority for specified information and responsibility for    establishing the controls for its generation, classification, collection,    processing, dissemination, and disposal. See information steward.   | 
  ||
information resources  | 
    Information and related    resources, such as personnel, equipment, funds, and information technology.   | 
  ||
information resources management (IRM)  | 
    The planning, budgeting, organizing, directing, training, controlling, and management activities associated with the burden, collection, creation, use, and dissemination of information by agencies.  | 
  ||
security  | 
    The protection of information    and information systems from unauthorized access, use, disclosure,    disruption, modification, or destruction in order to provide confidentiality,    integrity, and availability.   | 
  ||
information security architect  | 
    Individual, group, or    organization responsible for ensuring that the information security    requirements necessary to protect the organization’s core missions and    business processes are adequately addressed in all aspects of enterprise    architecture including reference models, segment and solution architectures,    and the resulting information systems supporting those missions and business    processes.   | 
  ||
information security continuous monitoring (ISCM)  | 
    Maintaining ongoing awareness    of information security, vulnerabilities, and threats to support    organizational risk management decisions.   | 
  ||
information security continuous monitoring (ISCM) process  | 
    A process to:   | 
  ||
information security continuous monitoring (ISCM) program  | 
    A program established to    collect information in accordance with pre-established metrics, utilizing    information readily available in part through implemented security controls.   | 
  ||
information security policy  | 
    Aggregate of directives, regulations, and rules that prescribe how an organization manages, protects, and distributes information.  | 
  ||
information security program plan  | 
    Formal document that provides    an overview of the security requirements for an organization-wide information    security program and describes the program management controls and common    controls in place or planned for meeting those requirements.   | 
  ||
information security risk  | 
    The risk to organizational    operations (including mission, functions, image, reputation), organizational    assets, individuals, other organizations, and the Nation due to the potential    for unauthorized access, use, disclosure, disruption, modification, or    destruction of information and/or information systems. See risk.   | 
  ||
information sharing environment (ISE)  | 
    1. An approach that    facilitates the sharing of terrorism and homeland security information.   | 
  ||
information steward  | 
    Individual or group that    helps to ensure the careful and responsible management of federal information    belonging to the Nation as a whole, regardless of the entity or source that    may have originated, created, or compiled the information. Information    stewards provide maximum access to federal information to elements of the    federal government and its customers, balanced by the obligation to protect    the information in accordance with the provisions of the Federal Information    Security Management Act (FISMA) and any associated security-related federal    policies, directives, regulations, standards, and guidance.   | 
  ||
information system (IS)  | 
    A discrete set of information    resources organized for the collection, processing, maintenance, use,    sharing, dissemination, or disposition of information.   | 
  ||
information system boundary  | 
    See authorization boundary.   | 
  ||
information system component  | 
    A discrete, identifiable    information technology asset (e.g., hardware, software, firmware) that    represents a building block of an information system. Information system    components include commercial information technology products.   | 
  ||
information system life cycle  | 
    The phases through which an information system passes, typically characterized as initiation, development, operation, and termination (i.e., sanitization, disposal and/or destruction).  | 
  ||
information system owner   | 
    Official responsible for the    overall procurement, development, integration, modification, or operation and    maintenance of an information system.   | 
  ||
information system resilience  | 
    The ability of an information    system to continue to: (i) operate under adverse conditions or stress, even    if in a degraded or debilitated state, while maintaining essential    operational capabilities; and (ii) recover to an effective operational    posture in a time frame consistent with mission needs.   | 
  ||
information system-related security risks  | 
    Risk that arises through the    loss of confidentiality, integrity, or availability of information or    information systems considering impacts to organizational operations and    assets, individuals, other organizations, and the Nation. A subset of    information security risk. See risk.   | 
  ||
information system service  | 
    A capability provided by an    information system that facilitates information processing, storage, or    transmission.   | 
  ||
information systems security (INFOSEC)  | 
    The protection of information    systems against unauthorized access to or modification of information,    whether in storage, processing or transit, and against the denial of service    to authorized users, including those measures necessary to detect, document,    and counter such threats. See information assurance (IA).   | 
  ||
information systems security (INFOSEC) boundary  | 
    An imaginary definable    perimeter encompassing all the critical functions in an INFOSEC product and    separating them from all other functions within the product.   | 
  ||
information systems security engineer (ISSE)  | 
    Individual assigned    responsibility for conducting information system security engineering    activities.   | 
  ||
information systems security engineering (ISSE)  | 
    Process that captures and    refines information security requirements and ensures their integration into    information technology component products and information systems through    purposeful security design or configuration.   | 
  ||
information systems security manager (ISSM)  | 
    Individual responsible for the information assurance of a program, organization, system, or enclave.  | 
  ||
information system security officer (ISSO)  | 
    Individual assigned    responsibility by the senior agency information security officer, authorizing    official, management official, or information system owner for maintaining    the appropriate operational security posture for an information system or    program.   | 
  ||