Skip to content
SynAc
Discovery

Recently updated

Published entries ordered by most recent updates.

  1. A table in which each row represents a subject, each column represents an object, and each entry is the set of access rights for that subject to that object.

  2. meta-dataJan 06, 2026

    Descriptive information about a data object; i.e., data about data, or data labels that describe other data. (See: security label. Compare: metadata)

  3. An organization "that coordinates and supports the response to security incidents that involve sites within a defined constituency." [R2350] (See: CERT, FIRST, security incident.)

  4. bitJan 06, 2026

    A contraction of the term "binary digit"; the smallest unit of information storage, which has two possible states or values. The values usually are represented by the symbols "0" (zero) and "1" (one). (See: block, byte, nibble, word.)

  5. Synonym for "data origin authentication". (See: authentication, data origin authentication.)

  6. access policyJan 06, 2026

    A kind of "security policy". (See: access, access control.)

  7. computer platformJan 06, 2026

    A combination of computer hardware and an operating system (which may consist of software, firmware, or both) for that hardware. (Compare: computer system.)

  8. An act or process by which a certificate user establishes that the assertions made by a digital certificate can be trusted. (See: valid certificate, validate vs. verify.)

  9. message digestJan 06, 2026

    Synonym for "hash result". (See: cryptographic hash.)

  10. associationJan 06, 2026

    A cooperative relationship between system entities, usually for the purpose of transferring information between them. (See: security association.)

  11. Information used to verify an identity claimed by or for an entity. (See: authentication, credential, user. Compare: identification information.)

  12. A secure message handling protocol [SDNS7] for use with X.400 and Internet mail protocols. Developed by NSA's SDNS program and used in the U.S. DoD's Defense Message System.

  13. nullJan 06, 2026

    "Dummy letter, letter symbol, or code group inserted into an encrypted message to delay or prevent its decryption or to complete encrypted groups for transmission or transmission security purposes." [C4009]

  14. add-on securityJan 06, 2026

    Incorporation of new or additional hardware, software, or firmware safeguards in an operational information system.

  15. correctness proofJan 06, 2026

    A mathematical proof of consistency between a specification for system security and the implementation of that specification. (See: correctness, formal specification.)

  16. attributeJan 06, 2026

    Information of a particular type concerning an identifiable system entity or object. An "attribute type" is the component of an attribute that indicates the class of information given by the attribute; and an "attribute value" is a particular instance of the class of information indicated by an attribute type. (See: attribute certificate.)

  17. GSS-APIJan 06, 2026

    See: Generic Security Service Application Program Interface.

  18. A CA owned by a payment card brand, such as MasterCard, Visa, or American Express. [SET2] (See: certification hierarchy, SET.)

  19. datagramJan 06, 2026

    "A self contained, independent entity of data [i.e., a packet] carrying sufficient information to be routed from the source [computer] to the destination computer without reliance on earlier exchanges between this source and destination computer and the transporting network." [R1983] Example: A PDU of IP.

  20. A symmetric block cipher, defined in the U.S. Government's DES. DEA uses a 64 bit key, of which 56 bits are independently chosen and 8 are parity bits, and maps a 64 bit block into another 64 bit block. [FP046] (See: AES, symmetric cryptography.)

  21. integrity labelJan 06, 2026

    A security label that tells the degree of confidence that may be placed in the data, and may also tell what countermeasures are required to be applied to protect the data from alteration and destruction. (See: integrity. Compare: classification label.)

  22. Courtney's lawsJan 06, 2026

    Principles for managing system security that were stated by Robert H. Courtney, Jr.

  23. end userJan 06, 2026

    A system entity, usually a human individual, that makes use of system resources, primarily for application purposes as opposed to system management purposes.

  24. IPJan 06, 2026

    See: Internet Protocol.

  25. object identifierJan 06, 2026

    An official, globally unique name for a thing, written as a sequence of integers (which are formed and assigned as defined in the ASN.1 standard) and used to reference the thing in abstract specifications and during negotiation of security services in a protocol.

  26. IPSJan 06, 2026

    See: Internet Protocol Suite.

  27. active contentJan 06, 2026

    Electronic documents that can carry out or trigger actions automatically on a computer platform without the intervention of a user.

  28. ECBJan 06, 2026

    See: electronic codebook.

  29. intrusionJan 06, 2026

    An unauthorized act of bypassing the security mechanisms of a network or information system.

  30. ACCJan 06, 2026

    See: access control center.

  31. An RA for an organization.

  32. encryptJan 06, 2026

    The generic term encompassing encipher and encode.

  33. A U.S. Government standard [FP197] (the successor to DES) that (a) specifies "the AES algorithm", which is a symmetric block cipher that is based on Rijndael and uses key sizes of 128, 192, or 256 bits to operate on a 128 bit block, and (b) states policy for using that algorithm to protect unclassified, sensitive data.

  34. key updateJan 06, 2026

    Derive a new key from an existing key. (Compare: rekey.)

  35. CLIPPERJan 06, 2026

    An integrated microcircuit (in MYK 7x series manufactured by Mykotronx, Inc.) that implements SKIPJACK, has a non deterministic random number generator, and supports key escrow. (See: Escrowed Encryption Standard. Compare: CLIPPER.)

  36. message indicatorJan 06, 2026

    Synonym for "initialization value". (Compare: indicator.)

  37. HTTPJan 06, 2026

    See: Hypertext Transfer Protocol.

  38. deletionJan 06, 2026

    See: secondary definition under "stream integrity service".

  39. classifyJan 06, 2026

    To officially designate an information item or type of information as being classified and assigned to a specific security level. (See: classified, declassify, security level.)

  40. architectureJan 06, 2026

    See: security architecture, system architecture.

  41. An Internet protocol [R2406, R4303] designed to provide data confidentiality service and other security services for IP datagrams. (See: IPsec. Compare: AH.)

  42. A data structure that enumerates digital certificates that have been invalidated by their issuer prior to when they were scheduled to expire. (See: certificate expiration, delta CRL, X.509 certificate revocation list.)

  43. clean systemJan 06, 2026

    A computer system in which the operating system and application system software and files have been freshly installed from trusted software distribution media. (Compare: secure state.)

  44. OFBJan 06, 2026

    See: output feedback.

  45. fail-softJan 06, 2026

    Selective termination of affected, non essential system functions when a failure occurs or is detected in the system. (See: failure control.)

  46. Synonym for "certification request".

  47. Synonym for "Network Hardware Layer".

  48. A type of key center (used in symmetric cryptography) that implements a key distribution protocol to provide keys (usually, session keys) to two (or more) entities that wish to communicate securely. (Compare: key translation center.)

  49. See: Internet Protocol Suite.

  50. detectionJan 06, 2026

    See: secondary definition under "security".