Recently updated
Published entries ordered by most recent updates.
- ticketJan 06, 2026
In access control, data that authenticates the identity of a client or a service and, together with a temporary encryption key (a session key), forms a credential.
- cyber operationsJan 06, 2026
In the NICE Framework, cybersecurity work where a person: Performs activities to gather evidence on criminal or foreign intelligence entities in order to mitigate possible or real time threats, protect against espionage or insider threats, foreign sabotage, international terrorist activities, or to support other intelligence activities.
- recoveryJan 06, 2026
The activities after an incident or event to restore essential services and operations in the short and medium term and fully restore all capabilities in the longer term.
- riskJan 06, 2026
The potential for an unwanted or adverse outcome resulting from an incident, event, or occurrence, as determined by the likelihood that a particular threat will exploit a particular vulnerability, with the associated consequences.
- AARJan 06, 2026
A document containing findings and recommendations from an exercise or a test.
- ACJan 06, 2026
The process of granting or denying specific requests to 1) obtain and use information and related information processing services and 2) enter specific physical facilities (e.g., federal buildings, military establishments, border crossing entrances).
- AADJan 06, 2026
The input data to the authenticated encryption function that is authenticated but not encrypted.
- WHOISJan 06, 2026
Adversaries may search public WHOIS data for information about victims that can be used during targeting. WHOIS data is stored by regional Internet registries (RIR) responsible for allocating and assigning Internet resources such as domain names. Anyone can query WHOIS servers for information about a registered domain, such as assigned IP blocks, contact information, and DNS nameservers.(Citation: WHOIS)
- ABACJan 06, 2026
An access control approach in which access is mediated based on attributes associated with subjects (requesters) and the objects to be accessed. Each object and subject has a set of associated attributes, such as location, time of creation, access rights, etc. Access to an object is authorized or denied depending upon whether the required (e.g., policy defined) correlation can be made between the attributes of that object and of the requesting subject.
- VNCJan 06, 2026
Adversaries may use Valid Accounts to remotely control machines using Virtual Network Computing (VNC). VNC is a platform independent desktop sharing system that uses the RFB (“remote framebuffer”) protocol to enable users to remotely control another computer’s display by relaying the screen, mouse, and keyboard inputs over the network.(Citation: The Remote Framebuffer Protocol)
- ACMJan 06, 2026
Implementations of formal AC policy such as AC model. Access control mechanisms can be designed to adhere to the properties of the model by machine implementation using protocols, architecture, or formal languages such as program code.
- ADJan 06, 2026
Input data to the CCM generation encryption process that is authenticated but not encrypted.
- 2FAJan 06, 2026
An authentication system that requires more than one distinct authentication factor for successful authentication. Multifactor authentication can be performed using a multifactor authenticator or by a combination of authenticators that provide different factors. The three authentication factors are something you know, something you have, and something you are.
- AALJan 06, 2026
A category describing the strength of the authentication process.
- ACMEJan 06, 2026
A protocol defined in IETF RFC 8555 that provides for the automated enrollment of certificates.
- ACPJan 06, 2026
High level requirements that specify how access is managed and who may access information under what circumstances.
- [T]2Jan 06, 2026
A binary representation for the integer T (using an agreed upon length and bit order).
- access program (SAP)Jan 05, 2026
A program established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally required for information at the same classification level.
- Address Resolution Protocol (ARP)Jan 05, 2026
A protocol used to obtain a node’s physical address. A client station broadcasts an ARP request onto the network with the Internet Protocol (IP) address of the target node with which it wishes to communicate, and with that address the node responds by sending back its physical address so that packets can be transmitted to it.
- (t + k)-way combination coverageJan 05, 2026
For a given test set that provides 100% t way coverage for n variables, (t+k) way combination coverage is the proportion of (t+k) way combinations of n variables for which all variable values configurations are fully covered.
- (p, t)-completenessJan 05, 2026
For a given set of n variables, (p, t) completeness is the proportion of the C(n, t) combinations that have configuration coverage of at least p.
- accuracy (relative)Jan 05, 2026
The degree of agreement between measured or calculated values among the devices and applications dependent on the position, navigation, or time data at an instant in time.
- 0sJan 05, 2026
For a positive integer s, 0s is the string that consists of s consecutive 0 bits.
- [x]sJan 05, 2026
The binary representation of the non negative integer x, in s bits, where x<2s.
- {X}Jan 05, 2026
Used to indicate that data X is an optional input to the key derivation function.
- a mod bJan 05, 2026
The modulo operation of integers a and b. “a mod b” returns the remainder after dividing a by b.
- A(i)Jan 05, 2026
The output of the ith iteration in the first pipeline of a double pipeline iteration mode.
- Active Security TestingJan 05, 2026
Security testing that involves direct interaction with a target, such as sending packets to a target.
- administrative incident (COMSEC)Jan 05, 2026
A violation of procedures or practices dangerous to security that is not serious enough to jeopardize the integrity of a controlled cryptographic item (CCI), but requires corrective action to ensure the violation does not recur or possibly lead to a reportable COMSEC incident.
- Active stateJan 05, 2026
A lifecycle state for a key in which the key may be used to cryptographically protect information (e.g., encrypt plaintext or generate a digital signature), to cryptographically process previously protected information (e.g., decrypt ciphertext or verify a digital signature) or both.
- Active DirectoryJan 05, 2026
A Microsoft directory service for the management of identities in Windows domain networks.
- Access Control PolicyJan 05, 2026
an access control paradigm whereby access rights are granted to users through the use of policies which combine attributes together. The policies can use any type of attributes (user attributes, resource attributes, environment attribute etc.
- account resolutionJan 05, 2026
The association of an RP subscriber account with information that is already held by the RP prior to the federation transaction and outside of a trust agreement.
- activation secretJan 05, 2026
A password that is used locally as an activation factor for a multi factor authenticator.
- Activation/IssuanceJan 05, 2026
A process that includes the procurement of FIPS approved blank PIV Cards or hardware/software tokens (for Derived PIV Credential), initializing them using appropriate software and data elements, personalization of these cards/tokens with the identity credentials of authorized subjects, and pick up/delivery of the personalized cards/tokens to the authorized subjects, along with appropriate instructions for protection and use.
- aJan 05, 2026
The significance level.
- access cross domain solutionJan 05, 2026
A type of transfer cross domain solution (CDS) that provides access to a computing platform, application, or data residing in different security domains without transfer of user data between the domains.
- Active TagJan 05, 2026
A tag that relies on a battery for power.
- activityJan 05, 2026
Set of cohesive tasks of a process.
- a | xJan 05, 2026
a divides x.
- adj-RIB-InJan 05, 2026
Routes learned from inbound update messages from BGP peers.
- AddressJan 05, 2026
The associated data string.
- Actual StateJan 05, 2026
The observable state or behavior of an assessment object (device, software, person, credential, account, etc.) at the point in time when the collector generates security related information. In particular, the actual state includes the states or behaviors that might indicate the presence of security defects.
- Additional Authenticated DataJan 05, 2026
The input data to the authenticated encryption function that is authenticated but not encrypted.
- (r, s)Jan 05, 2026
Digital signature for DSA or ECDSA.
- Ad Hoc HIEsJan 05, 2026
An Ad Hoc HIE occurs when two healthcare organizations exchange health information, usually under the precondition of familiarity and trust, using existing and usual office infrastructure such as mail, fax, e mail and phone calls.
- active cyber defenseJan 05, 2026
Synchronized, real time capability to discover, detect, analyze, and mitigate threats and vulnerabilities.
- ∅Jan 05, 2026
The empty binary string. That is, for any binary string A,∅ || A = A || ∅= A.
- \(\varepsilon\)Jan 05, 2026
A positive constant that is assumed to be no greater than \(2^{ 32}\)
- adaptabilityJan 05, 2026
The property of an architecture, design, and implementation that can accommodate changes to the threat model, mission or business functions, systems, and technologies without major programmatic impacts.