Skip to content
SynAc
Discovery

Recently updated

Published entries ordered by most recent updates.

  1. TERM0xab

    Hexadecimal notation that is used to define a byte (i.e., eight bits) of information, where a and b each specify four bits of information and have values from the range {0, 1, 2,…F}. For example, 0xc6 is used to represent 11000110, where c is 1100, and 6 is 0110.

  2. A senior (federal) official or executive with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation.

  3. A device that logically connects wireless client devices operating in infrastructure to one another and provides access to a distribution system, if connected, which is typically an organization’s enterprise wired network.

  4. TERM(n, e)

    RSA public key.

  5. The internal state of the DRBG at a point in time. The types and number of the ai values depends on the specific DRBG mechanism.

  6. RSA private key in the prime factor format.

  7. An entity in a blockchain that is identified with an address and can send transactions to the blockchain.

  8. Information known by two parties that is cryptographically bound to the secret keying material being protected using the encryption operation.

  9. The absolute difference between the noisy and unaltered versions of a query’s output.

  10. TERM|x|

    The length (in bits) of the bit string x. For example, |01100100| = 8.

  11. TERM+

    Addition. For example, 5 + 4 = 9.

  12. Formal presentations of the security policies enforced by AC systems, and are useful for proving theoretical limitations of systems. AC models bridge the gap in abstraction between policy and mechanism.

  13. The ability to regain ownership of a subscriber account and its associated information and privileges.

  14. TERM[a, b]

    The set of integers x such that a ≤ x ≤ b.

  15. TERM0x0X

    8 bit binary representation of the hexadecimal number X, for example, 0x02 = 00000010.

  16. Access Management is the set of practices that enables only those permitted the ability to perform an action on a particular resource. The three most common Access Management services you encounter every day perhaps without realizing it are: Policy Administration, Authentication, and Authorization.

  17. RSA private key in the Chinese Remainder Theorem (CRT) format.

  18. A wireless network that allows easy connection establishment between wireless client devices in the same physical area without the use of an infrastructure device, such as an access point or a base station.

  19. Routes that the BGP router will advertise, based on its local policy, to its peers.

  20. A device for moving or controlling a mechanism or system. It is operated by a source of energy, typically electric current, hydraulic fluid pressure, or pneumatic pressure, and converts that energy into motion. An actuator is the mechanism by which a control system acts upon an environment. The control system can be simple (a fixed mechanical or electronic system), software based (e.g., a printer driver, robot control system), or a human or other agent.

  21. TERMActor

    See threat actor.

  22. TERM(n, d)

    RSA private key in the basic format.

  23. See user agreement.

  24. The ability to change something in the physical world.

  25. reflects the access required to exploit the vulnerability.

  26. TERM{x, y}

    A set containing the integers x and y.

  27. TERM0x

    A string of x zero bits. For example, 05 = 00000.

  28. A bit string that is produced by encapsulation and used as an input to decapsulation.

  29. A logical collection of hosts and network resources (e.g., department, building, company, organization) governed by common policies.

  30. To meet the addressable implementation specifications, a covered entity or business associate must (i) assess whether each implementation specification is a reasonable and appropriate safeguard in its environment, when analyzed with reference to the likely contribution to protecting the electronic protected health information; and (ii) as applicable to the covered entity or business associate (A) Implement the implementation specification if reasonable and appropriate; or (B) if implementing the implementation specification is not reasonable and appropriate—(1) document why it would not be reasonable and appropriate to implement the implementation specification; and (2) implement an equivalent alternative measure if reasonable and appropriate.

  31. View of an object that focuses on the information relevant to a particular purpose and ignores the remainder of the information.

  32. A cell is regarded as confidential, if the n largest units contribute more than k % to the cell total, e.g., n=2 and k=85 means that a cell is defined as risky if the two largest units contribute more than 85 % to the cell total. The n and k are given by the statistical authority. In some NSOs [national statistical office] the values of n and k are confidential.

  33. The association of multiple federated identifiers with a single RP subscriber account or the management of those associations.

  34. Process of obtaining a system, product, or service.

  35. A number assigned to an individual item of COMSEC material at its point of origin to facilitate its handling and accounting.

  36. The floor of a non negative number a: the greatest integer that is smaller than or equal to a. For example,⎣5⎦ = 5, and⎣5.9⎦ = 5.

  37. An entity responsible for monitoring and granting access privileges for other authorized entities.

  38. The process of inputting an activation factor into a multi factor authenticator to enable its use for authentication.

  39. For an element s and a set S, s \(\in\)

  40. Closeness of computations or estimates to the exact or true values that the statistics were intended to measure.

  41. An additional authentication factor that is used to enable successful authentication with a multi factor authenticator.

  42. See user agreement.

  43. TERM[x]m

    The binary representation of the non negative integer x, in m bits, where x<2m.

  44. An assessment object that includes specific protection related pursuits or actions supporting an information system that involve people (e.g., conducting system backup operations, monitoring network traffic).

  45. The ceiling of x; the smallest integer ≥ x. For example,⎾5⏋= 5 and⎾5.2⏋= 6.

  46. The degree of conformity of a measured or calculated value to the true value, typically based on a global reference system. For time, the global reference can be based on the following time scales: UTC, International Atomic Time (TAI), or GPS. For position, the global reference can be WGS 84.

  47. A set of procedures and/or processes, normally automated, which allows access to a controlled area or to information to be controlled, in accordance with pre established policies and rules.

  48. TERM0x00

    An all zero octet.

  49. Privilege to perform action on an object. Read, write, execute, append, modify, delete, and create are examples of access types.

  50. A measure of how well the observed values match the expected value. See Sections 2.11 and 3.11.