Recently updated
Published entries ordered by most recent updates.
- TERMmalicious logic
Hardware, firmware, or software that is intentionally included or inserted in a system to perform an unauthorized function or process that will have adverse impact on the confidentiality, integrity, or availability of an information system.
- TERMdomain name
The style of identifier that is defined for subtrees in the Internet DNS i.e., a sequence of case insensitive ASCII labels separated by dots (e.g., "bbn.com") and also is used in other types of Internet identifiers, such as host names (e.g., "rosslyn.bbn.com"), mailbox names (e.g., "rshirey@bbn.com") and URLs (e.g., "http://www.rosslyn.bbn.com/foo"). (See: domain. Compare: DN.)
- ACRONYMFIREFLY
"Key management protocol based on public key cryptography." [C4009]
- TERMdigital envelope
A combination of (a) encrypted content data (of any kind) intended for a recipient and (b) the content encryption key in an encrypted form that has been prepared for the use of the recipient.
- ACRONYMGDOI
See: Group Domain of Interpretation.
- TERMBiba model
A formal, mathematical, state transition model of integrity policy for multilevel secure computer systems [Biba]. (See: source integrity. Compare: Bell LaPadula model.)
A public key certificate that contains a public key that is intended to be used for encrypting data, rather than for verifying digital signatures or performing other cryptographic functions.
A security service that verifies the identity of a system entity that is claimed to be the original source of received data. (See: authentication, authentication service.)
- TERMleast trust
The principle that a security architecture should be designed in a way that minimizes (a) the number of components that require trust and (b) the extent to which each component is trusted. (Compare: least privilege, trust level.)
An evaluation or attack technique in which specifications and documentation for a system are analyzed to hypothesize flaws in the system. The list of hypothetical flaws is prioritized on the basis of the estimated probability that a flaw exists and, assuming it does, on the ease of exploiting it and the extent of control or compromise it would provide. The prioritized list is used to direct a penetration test or attack against the system. [NCS04] (See: fault tree, flaw.)
Refers generically to a database server or other system that stores and provides access to values of descriptive or operational data items that are associated with the components of a system. (Compare: repository.)
Protection of data confidentiality against inference attack. (See: traffic flow confidentiality.)
A cryptanalysis technique in which the analyst tries to determine the key solely from knowledge of intercepted cipher text (although the analyst may also know other clues, such as the cryptographic algorithm, the language in which the plain text was written, the subject matter of the plain text, and some probable plaintext words.)
- TERMfalsification
A type of threat action whereby false data deceives an authorized entity. (See: active wiretapping, deception.)
A client server Internet protocol [R1413] for learning the identity of a user of a particular TCP connection.
The principle that a security mechanism should be designed to minimize the number of alternative ways of achieving a service. (Compare: economy of mechanism.)
- TERMdominate
Security level A is said to "dominate" security level B if the (hierarchical) classification level of A is greater (higher) than or equal to that of B, and A's (nonhierarchical) categories include (as a subset) all of B's categories. (See: lattice, lattice model.)
A key recovery technique for storing knowledge of a cryptographic key by encrypting it with another key and ensuring that only certain third parties called "recovery agents" can perform the decryption operation to retrieve the stored key. Key encapsulation typically permits direct retrieval of a secret key used to provide data confidentiality. (Compare: key escrow.)
- TERMdefense in depth
"The siting of mutually supporting defense positions designed to absorb and progressively weaken attack, prevent initial
- TERMCOMSEC account
"Administrative entity, identified by an account number, used to maintain accountability, custody, and control of COMSEC material." [C4009] (See: COMSEC custodian.)
- TERMformal
Expressed in a restricted syntax language with defined semantics based on well established mathematical concepts. [CCIB] (Compare: informal, semiformal.)
- TERMhyperlink
In hypertext or hypermedia, an information object (such as a word, a phrase, or an image, which usually is highlighted by color or underscoring) that points (i.e., indicates how to connect) to related information that is located elsewhere and can be retrieved by activating the link (e.g., by selecting the object with a mouse pointer and then clicking).
- ACRONYMMIME
See: Multipurpose Internet Mail Extensions.
- TERMexpire
Cease to be valid (i.e., change from being valid to being invalid) because its assigned lifetime has been exceeded. (See: certificate expiration.)
Synonym for "certification".
- TERManonymizer
An internetwork service, usually provided via a proxy server, that provides anonymity and privacy for clients. That is, the service enables a client to access servers (a) without allowing
An entity that issues digital certificates (especially X.509 certificates) and vouches for the binding between the data items in a certificate.
- TERMmutual suspicion
The state that exists between two interacting system entities in which neither entity can trust the other to function correctly with regard to some security requirement.
- TERMMISSI user
A system entity that is the subject of one or more MISSI X.509 public key certificates issued under a MISSI certification hierarchy. (See: personality.)
A security service that protects against unauthorized changes to data, including both intentional change or destruction and accidental change or loss, by ensuring that changes to data are detectable. (See: data integrity, checksum, datagram integrity service.)
A system environment that meets both of the following conditions: (a) Application developers (including maintainers) have sufficient clearances and authorizations to provide an acceptable presumption that they have not introduced
- TERMlong title
"Descriptive title of [an item of COMSEC material]." [C4009] (Compare: short title.)
An algorithm for asymmetric cryptography, invented in 1985 by Taher El Gamal, that is based on the difficulty of calculating discrete logarithms and can be used for both encryption and digital signatures. [ElGa]
- TERMclient
A system entity that requests and uses a service provided by another system entity, called a "server". (See: server.)
- TERMaccess right
Synonym for "authorization"; emphasizes the possession of the authorization by a system entity.
- TERMGreen Book
Synonym for "Defense Password Management Guideline" [CSC2].
- TERMgranularity
Relative fineness to which an access control mechanism can be adjusted.
- TERMInternet Layer
See: Internet Protocol Suite.
A U.S. Department of Commerce organization that promotes U.S. economic growth by working with industry to develop and apply technology, measurements, and standards. Has primary U.S. Government responsibility for INFOSEC standards for sensitive unclassified information. (See: ANSI, DES, DSA, DSS, FIPS, NIAP, NSA.)
- TERMdisruption
An event which causes unplanned interruption in operations or functions for an unacceptable length of time.
- TERMkeyed hash
A cryptographic hash (e.g., [R1828]) in which the mapping to a hash result is varied by a second input parameter that is a cryptographic key. (See: checksum.)
The set of network communication protocols that are specified by the IETF, and approved as Internet Standards by the IESG, within the oversight of the IAB. (See: OSIRM Security Architecture. Compare: OSIRM.)
A technical advisory group of the ISOC, chartered by the ISOC Trustees to provide oversight of Internet architecture and protocols and, in the context of Internet Standards, a body to which decisions of the IESG may be appealed. Responsible for approving appointments to the IESG from among nominees submitted by the IETF nominating committee. (RFC 2026)
- ACRONYMHDM
See: Hierarchical Development Methodology.
Method for judging the maturity of software processes in an organization and for identifying crucial practices needed to increase process maturity. [Chris] (Compare: Common Criteria.)
"Concealing or altering of characteristic communications patterns to hide information that could be of value to an adversary." [C4009] (See: operations security, traffic flow confidentiality, TRANSEC.)
- TERMhash value
A numeric value resulting from applying a mathematical algorithm against a set of data such as a file.
- TERMmasquerade
A type of threat action whereby an unauthorized entity gains access to a system or performs a malicious act by illegitimately posing as an authorized entity. (See: deception.)
- TERMCryptoki
A CAPI defined in PKCS 11. Pronunciation: "CRYPTO key". Derivation: Abbreviation of "cryptographic token interface".
- ACRONYMNIAP
See: National Information Assurance Partnership.