Recently updated
Published entries ordered by most recent updates.
- malicious logicJan 06, 2026
Hardware, firmware, or software that is intentionally included or inserted in a system to perform an unauthorized function or process that will have adverse impact on the confidentiality, integrity, or availability of an information system.
- domain nameJan 06, 2026
The style of identifier that is defined for subtrees in the Internet DNS i.e., a sequence of case insensitive ASCII labels separated by dots (e.g., "bbn.com") and also is used in other types of Internet identifiers, such as host names (e.g., "rosslyn.bbn.com"), mailbox names (e.g., "rshirey@bbn.com") and URLs (e.g., "http://www.rosslyn.bbn.com/foo"). (See: domain. Compare: DN.)
- FIREFLYJan 06, 2026
"Key management protocol based on public key cryptography." [C4009]
- digital envelopeJan 06, 2026
A combination of (a) encrypted content data (of any kind) intended for a recipient and (b) the content encryption key in an encrypted form that has been prepared for the use of the recipient.
- GDOIJan 06, 2026
See: Group Domain of Interpretation.
- Biba modelJan 06, 2026
A formal, mathematical, state transition model of integrity policy for multilevel secure computer systems [Biba]. (See: source integrity. Compare: Bell LaPadula model.)
- encryption certificateJan 06, 2026
A public key certificate that contains a public key that is intended to be used for encrypting data, rather than for verifying digital signatures or performing other cryptographic functions.
- data origin authentication serviceJan 06, 2026
A security service that verifies the identity of a system entity that is claimed to be the original source of received data. (See: authentication, authentication service.)
- least trustJan 06, 2026
The principle that a security architecture should be designed in a way that minimizes (a) the number of components that require trust and (b) the extent to which each component is trusted. (Compare: least privilege, trust level.)
- flaw hypothesis methodologyJan 06, 2026
An evaluation or attack technique in which specifications and documentation for a system are analyzed to hypothesize flaws in the system. The list of hypothetical flaws is prioritized on the basis of the estimated probability that a flaw exists and, assuming it does, on the ease of exploiting it and the extent of control or compromise it would provide. The prioritized list is used to direct a penetration test or attack against the system. [NCS04] (See: fault tree, flaw.)
- directory, DirectoryJan 06, 2026
Refers generically to a database server or other system that stores and provides access to values of descriptive or operational data items that are associated with the components of a system. (Compare: repository.)
- inference controlJan 06, 2026
Protection of data confidentiality against inference attack. (See: traffic flow confidentiality.)
- ciphertext-only attackJan 06, 2026
A cryptanalysis technique in which the analyst tries to determine the key solely from knowledge of intercepted cipher text (although the analyst may also know other clues, such as the cryptographic algorithm, the language in which the plain text was written, the subject matter of the plain text, and some probable plaintext words.)
- falsificationJan 06, 2026
A type of threat action whereby false data deceives an authorized entity. (See: active wiretapping, deception.)
- Identification ProtocolJan 06, 2026
A client server Internet protocol [R1413] for learning the identity of a user of a particular TCP connection.
- economy of alternativesJan 06, 2026
The principle that a security mechanism should be designed to minimize the number of alternative ways of achieving a service. (Compare: economy of mechanism.)
- dominateJan 06, 2026
Security level A is said to "dominate" security level B if the (hierarchical) classification level of A is greater (higher) than or equal to that of B, and A's (nonhierarchical) categories include (as a subset) all of B's categories. (See: lattice, lattice model.)
- key encapsulationJan 06, 2026
A key recovery technique for storing knowledge of a cryptographic key by encrypting it with another key and ensuring that only certain third parties called "recovery agents" can perform the decryption operation to retrieve the stored key. Key encapsulation typically permits direct retrieval of a secret key used to provide data confidentiality. (Compare: key escrow.)
- defense in depthJan 06, 2026
"The siting of mutually supporting defense positions designed to absorb and progressively weaken attack, prevent initial
- COMSEC accountJan 06, 2026
"Administrative entity, identified by an account number, used to maintain accountability, custody, and control of COMSEC material." [C4009] (See: COMSEC custodian.)
- formalJan 06, 2026
Expressed in a restricted syntax language with defined semantics based on well established mathematical concepts. [CCIB] (Compare: informal, semiformal.)
- hyperlinkJan 06, 2026
In hypertext or hypermedia, an information object (such as a word, a phrase, or an image, which usually is highlighted by color or underscoring) that points (i.e., indicates how to connect) to related information that is located elsewhere and can be retrieved by activating the link (e.g., by selecting the object with a mouse pointer and then clicking).
- MIMEJan 06, 2026
See: Multipurpose Internet Mail Extensions.
- expireJan 06, 2026
Cease to be valid (i.e., change from being valid to being invalid) because its assigned lifetime has been exceeded. (See: certificate expiration.)
- digital certificationJan 06, 2026
Synonym for "certification".
- anonymizerJan 06, 2026
An internetwork service, usually provided via a proxy server, that provides anonymity and privacy for clients. That is, the service enables a client to access servers (a) without allowing
- certification authorityJan 06, 2026
An entity that issues digital certificates (especially X.509 certificates) and vouches for the binding between the data items in a certificate.
- mutual suspicionJan 06, 2026
The state that exists between two interacting system entities in which neither entity can trust the other to function correctly with regard to some security requirement.
- MISSI userJan 06, 2026
A system entity that is the subject of one or more MISSI X.509 public key certificates issued under a MISSI certification hierarchy. (See: personality.)
- data integrity serviceJan 06, 2026
A security service that protects against unauthorized changes to data, including both intentional change or destruction and accidental change or loss, by ensuring that changes to data are detectable. (See: data integrity, checksum, datagram integrity service.)
- closed security environmentJan 06, 2026
A system environment that meets both of the following conditions: (a) Application developers (including maintainers) have sufficient clearances and authorizations to provide an acceptable presumption that they have not introduced
- long titleJan 06, 2026
"Descriptive title of [an item of COMSEC material]." [C4009] (Compare: short title.)
- El Gamal algorithmJan 06, 2026
An algorithm for asymmetric cryptography, invented in 1985 by Taher El Gamal, that is based on the difficulty of calculating discrete logarithms and can be used for both encryption and digital signatures. [ElGa]
- clientJan 06, 2026
A system entity that requests and uses a service provided by another system entity, called a "server". (See: server.)
- access rightJan 06, 2026
Synonym for "authorization"; emphasizes the possession of the authorization by a system entity.
- Green BookJan 06, 2026
Synonym for "Defense Password Management Guideline" [CSC2].
- granularityJan 06, 2026
Relative fineness to which an access control mechanism can be adjusted.
- Internet LayerJan 06, 2026
See: Internet Protocol Suite.
- National Institute of Standards and TechnologyJan 06, 2026
A U.S. Department of Commerce organization that promotes U.S. economic growth by working with industry to develop and apply technology, measurements, and standards. Has primary U.S. Government responsibility for INFOSEC standards for sensitive unclassified information. (See: ANSI, DES, DSA, DSS, FIPS, NIAP, NSA.)
- disruptionJan 06, 2026
An event which causes unplanned interruption in operations or functions for an unacceptable length of time.
- keyed hashJan 06, 2026
A cryptographic hash (e.g., [R1828]) in which the mapping to a hash result is varied by a second input parameter that is a cryptographic key. (See: checksum.)
- Internet Protocol SuiteJan 06, 2026
The set of network communication protocols that are specified by the IETF, and approved as Internet Standards by the IESG, within the oversight of the IAB. (See: OSIRM Security Architecture. Compare: OSIRM.)
- Internet Architecture BoardJan 06, 2026
A technical advisory group of the ISOC, chartered by the ISOC Trustees to provide oversight of Internet architecture and protocols and, in the context of Internet Standards, a body to which decisions of the IESG may be appealed. Responsible for approving appointments to the IESG from among nominees submitted by the IETF nominating committee. (RFC 2026)
- HDMJan 06, 2026
See: Hierarchical Development Methodology.
- Capability Maturity ModelJan 06, 2026
Method for judging the maturity of software processes in an organization and for identifying crucial practices needed to increase process maturity. [Chris] (Compare: Common Criteria.)
- communications coverJan 06, 2026
"Concealing or altering of characteristic communications patterns to hide information that could be of value to an adversary." [C4009] (See: operations security, traffic flow confidentiality, TRANSEC.)
- hash valueJan 06, 2026
A numeric value resulting from applying a mathematical algorithm against a set of data such as a file.
- masqueradeJan 06, 2026
A type of threat action whereby an unauthorized entity gains access to a system or performs a malicious act by illegitimately posing as an authorized entity. (See: deception.)
- CryptokiJan 06, 2026
A CAPI defined in PKCS 11. Pronunciation: "CRYPTO key". Derivation: Abbreviation of "cryptographic token interface".
- NIAPJan 06, 2026
See: National Information Assurance Partnership.