Recently updated
Published entries ordered by most recent updates.
- Access Control MatrixJan 06, 2026
A table in which each row represents a subject, each column represents an object, and each entry is the set of access rights for that subject to that object.
- meta-dataJan 06, 2026
Descriptive information about a data object; i.e., data about data, or data labels that describe other data. (See: security label. Compare: metadata)
- computer security incident response teamJan 06, 2026
An organization "that coordinates and supports the response to security incidents that involve sites within a defined constituency." [R2350] (See: CERT, FIRST, security incident.)
- bitJan 06, 2026
A contraction of the term "binary digit"; the smallest unit of information storage, which has two possible states or values. The values usually are represented by the symbols "0" (zero) and "1" (one). (See: block, byte, nibble, word.)
- origin authenticationJan 06, 2026
Synonym for "data origin authentication". (See: authentication, data origin authentication.)
- access policyJan 06, 2026
A kind of "security policy". (See: access, access control.)
- computer platformJan 06, 2026
A combination of computer hardware and an operating system (which may consist of software, firmware, or both) for that hardware. (Compare: computer system.)
- certificate validationJan 06, 2026
An act or process by which a certificate user establishes that the assertions made by a digital certificate can be trusted. (See: valid certificate, validate vs. verify.)
- message digestJan 06, 2026
Synonym for "hash result". (See: cryptographic hash.)
- associationJan 06, 2026
A cooperative relationship between system entities, usually for the purpose of transferring information between them. (See: security association.)
- authentication informationJan 06, 2026
Information used to verify an identity claimed by or for an entity. (See: authentication, credential, user. Compare: identification information.)
- Message Security ProtocolJan 06, 2026
A secure message handling protocol [SDNS7] for use with X.400 and Internet mail protocols. Developed by NSA's SDNS program and used in the U.S. DoD's Defense Message System.
- nullJan 06, 2026
"Dummy letter, letter symbol, or code group inserted into an encrypted message to delay or prevent its decryption or to complete encrypted groups for transmission or transmission security purposes." [C4009]
- add-on securityJan 06, 2026
Incorporation of new or additional hardware, software, or firmware safeguards in an operational information system.
- correctness proofJan 06, 2026
A mathematical proof of consistency between a specification for system security and the implementation of that specification. (See: correctness, formal specification.)
- attributeJan 06, 2026
Information of a particular type concerning an identifiable system entity or object. An "attribute type" is the component of an attribute that indicates the class of information given by the attribute; and an "attribute value" is a particular instance of the class of information indicated by an attribute type. (See: attribute certificate.)
- GSS-APIJan 06, 2026
See: Generic Security Service Application Program Interface.
- brand certification authorityJan 06, 2026
A CA owned by a payment card brand, such as MasterCard, Visa, or American Express. [SET2] (See: certification hierarchy, SET.)
- datagramJan 06, 2026
"A self contained, independent entity of data [i.e., a packet] carrying sufficient information to be routed from the source [computer] to the destination computer without reliance on earlier exchanges between this source and destination computer and the transporting network." [R1983] Example: A PDU of IP.
- Data Encryption AlgorithmJan 06, 2026
A symmetric block cipher, defined in the U.S. Government's DES. DEA uses a 64 bit key, of which 56 bits are independently chosen and 8 are parity bits, and maps a 64 bit block into another 64 bit block. [FP046] (See: AES, symmetric cryptography.)
- integrity labelJan 06, 2026
A security label that tells the degree of confidence that may be placed in the data, and may also tell what countermeasures are required to be applied to protect the data from alteration and destruction. (See: integrity. Compare: classification label.)
- Courtney's lawsJan 06, 2026
Principles for managing system security that were stated by Robert H. Courtney, Jr.
- end userJan 06, 2026
A system entity, usually a human individual, that makes use of system resources, primarily for application purposes as opposed to system management purposes.
- IPJan 06, 2026
See: Internet Protocol.
- object identifierJan 06, 2026
An official, globally unique name for a thing, written as a sequence of integers (which are formed and assigned as defined in the ASN.1 standard) and used to reference the thing in abstract specifications and during negotiation of security services in a protocol.
- IPSJan 06, 2026
See: Internet Protocol Suite.
- active contentJan 06, 2026
Electronic documents that can carry out or trigger actions automatically on a computer platform without the intervention of a user.
- ECBJan 06, 2026
See: electronic codebook.
- intrusionJan 06, 2026
An unauthorized act of bypassing the security mechanisms of a network or information system.
- ACCJan 06, 2026
See: access control center.
- organizational registration authorityJan 06, 2026
An RA for an organization.
- encryptJan 06, 2026
The generic term encompassing encipher and encode.
- Advanced Encryption StandardJan 06, 2026
A U.S. Government standard [FP197] (the successor to DES) that (a) specifies "the AES algorithm", which is a symmetric block cipher that is based on Rijndael and uses key sizes of 128, 192, or 256 bits to operate on a 128 bit block, and (b) states policy for using that algorithm to protect unclassified, sensitive data.
- key updateJan 06, 2026
Derive a new key from an existing key. (Compare: rekey.)
- CLIPPERJan 06, 2026
An integrated microcircuit (in MYK 7x series manufactured by Mykotronx, Inc.) that implements SKIPJACK, has a non deterministic random number generator, and supports key escrow. (See: Escrowed Encryption Standard. Compare: CLIPPER.)
- message indicatorJan 06, 2026
Synonym for "initialization value". (Compare: indicator.)
- HTTPJan 06, 2026
See: Hypertext Transfer Protocol.
- deletionJan 06, 2026
See: secondary definition under "stream integrity service".
- classifyJan 06, 2026
To officially designate an information item or type of information as being classified and assigned to a specific security level. (See: classified, declassify, security level.)
- architectureJan 06, 2026
See: security architecture, system architecture.
- Encapsulating Security PayloadJan 06, 2026
An Internet protocol [R2406, R4303] designed to provide data confidentiality service and other security services for IP datagrams. (See: IPsec. Compare: AH.)
- certificate revocation listJan 06, 2026
A data structure that enumerates digital certificates that have been invalidated by their issuer prior to when they were scheduled to expire. (See: certificate expiration, delta CRL, X.509 certificate revocation list.)
- clean systemJan 06, 2026
A computer system in which the operating system and application system software and files have been freshly installed from trusted software distribution media. (Compare: secure state.)
- OFBJan 06, 2026
See: output feedback.
- fail-softJan 06, 2026
Selective termination of affected, non essential system functions when a failure occurs or is detected in the system. (See: failure control.)
- certificate requestJan 06, 2026
Synonym for "certification request".
- Network Substrate LayerJan 06, 2026
Synonym for "Network Hardware Layer".
- key distribution centerJan 06, 2026
A type of key center (used in symmetric cryptography) that implements a key distribution protocol to provide keys (usually, session keys) to two (or more) entities that wish to communicate securely. (Compare: key translation center.)
- Network Hardware LayerJan 06, 2026
See: Internet Protocol Suite.
- detectionJan 06, 2026
See: secondary definition under "security".