Skip to content
SynAc
Browse

Terms

Alphabetical index of published term entries. Use the letter rail to jump.

  1. aUpdated Jan 05, 2026

    The significance level.

  2. A1 computer systemUpdated Jan 06, 2026

    See: Tutorial under "Trusted Computer System Evaluation Criteria". (Compare: beyond A1.)

  3. ABA GuidelinesUpdated Jan 06, 2026

    "American Bar Association (ABA) Digital Signature Guidelines" [DSG], a framework of legal principles for using digital signatures and digital certificates in electronic commerce.

  4. Abbreviated Dialing NumbersUpdated Jan 05, 2026

    phone book entries kept on the SIM.

  5. absolute errorUpdated Jan 05, 2026

    The absolute difference between the noisy and unaltered versions of a query’s output.

  6. abstractionUpdated Jan 05, 2026

    View of an object that focuses on the information relevant to a particular purpose and ignores the remainder of the information.

  7. Abstract Syntax Notation OneUpdated Jan 06, 2026

    A standard for describing data objects. [Larm, X680] (See: CMS.)

  8. Abuse Accessibility FeaturesUpdated Jan 06, 2026

    Adversaries may abuse accessibility features in Android devices to steal sensitive data and to spread malware to other devices. Accessibility features in Android are designed to assist users with disabilities, performing a variety of tasks, such as using Action Blocks to control lightbulbs, and changing the device’s user interface, such as changing the font size and adjusting contract or colors.(Citation: Google AndroidAcsOverview)

  9. Adversaries may circumvent mechanisms designed to control elevated privileges to gain higher level permissions. Most modern systems contain native elevation control mechanisms that are intended to limit privileges that a user can gain on a machine. Authorization has to be granted to specific users in order to perform tasks that are designated as higher risk. An adversary can use several methods to take advantage of built in control mechanisms in order to escalate privileges on a system.

  10. Acceptable RiskUpdated Jan 06, 2026

    Level of residual risk to the organization’s operations, assets, or individuals that falls within the defined risk appetite and risk tolerance by the organization.

  11. acceptable use agreementUpdated Jan 05, 2026

    See user agreement.

  12. accessUpdated Jan 06, 2026

    The ability and means to communicate with or otherwise interact with a system, to use system resources to handle information, to gain knowledge of the information the system contains, or to control system components and functions.

  13. access agreementUpdated Jan 05, 2026

    See user agreement.

  14. access authorityUpdated Jan 05, 2026

    An entity responsible for monitoring and granting access privileges for other authorized entities.

  15. A PKI operated by the U.S. Government's General Services Administration in cooperation with industry partners. (See: CAM.)

  16. Access ComplexityUpdated Jan 05, 2026

    reflects the complexity of the attack required to exploit the software feature misuse vulnerability.

  17. Access ControlUpdated Jan 06, 2026

    Access control is the set of mechanisms and policies used to restrict access to resources and enforce authorization decisions.

  18. access control centerUpdated Jan 06, 2026

    A computer that maintains a database (possibly in the form of an access control matrix) defining the security policy for an access control service, and that acts as a server for clients requesting access control decisions.

  19. access control listUpdated Jan 06, 2026

    A mechanism that implements access control for a system resource by enumerating the identities of the system entities that are permitted to access the resources.

  20. Access Control MatrixUpdated Jan 06, 2026

    A table in which each row represents a subject, each column represents an object, and each entry is the set of access rights for that subject to that object.

  21. access control mechanismUpdated Jan 06, 2026

    Implementations of formal AC policy such as AC model. Access control mechanisms can be designed to adhere to the properties of the model by machine implementation using protocols, architecture, or formal languages such as program code.

  22. Access Control ModelUpdated Jan 05, 2026

    Formal presentations of the security policies enforced by AC systems, and are useful for proving theoretical limitations of systems. AC models bridge the gap in abstraction between policy and mechanism.

  23. Access Control PolicyUpdated Jan 05, 2026

    an access control paradigm whereby access rights are granted to users through the use of policies which combine attributes together. The policies can use any type of attributes (user attributes, resource attributes, environment attribute etc.

  24. access control serviceUpdated Jan 06, 2026

    A security service that protects against a system entity using a system resource in a way not authorized by the system's security policy. (See: access control, discretionary access control, identity based security policy, mandatory access control, rule based security policy.)

  25. Access control systemUpdated Jan 05, 2026

    A set of procedures and/or processes, normally automated, which allows access to a controlled area or to information to be controlled, in accordance with pre established policies and rules.

  26. access cross domain solutionUpdated Jan 05, 2026

    A type of transfer cross domain solution (CDS) that provides access to a computing platform, application, or data residing in different security domains without transfer of user data between the domains.

  27. access levelUpdated Jan 06, 2026

    A category within a given security classification limiting entry or system connectivity to only authorized persons.

  28. access listUpdated Jan 06, 2026

    Roster of individuals authorized admittance to a controlled area.

  29. Access ManagementUpdated Jan 05, 2026

    Access Management is the set of practices that enables only those permitted the ability to perform an action on a particular resource. The three most common Access Management services you encounter every day perhaps without realizing it are: Policy Administration, Authentication, and Authorization.

  30. access modeUpdated Jan 06, 2026

    A distinct type of data processing operation (e.g., read, write, append, or execute, or a combination of operations) that a subject can potentially perform on an object in an information system. [Huff] (See: read, write.)

  31. Access NotificationsUpdated Jan 06, 2026

    Adversaries may collect data within notifications sent by the operating system or other applications. Notifications may contain sensitive data such as one time authentication codes sent over SMS, email, or other mediums. In the case of Credential Access, adversaries may attempt to intercept one time code sent to the device. Adversaries can also dismiss notifications to prevent the user from noticing that the notification has arrived and can trigger action buttons contained within notifications.(Citation: ESET 2FA Bypass)

  32. Access Point (AP)Updated Jan 05, 2026

    A device that logically connects wireless client devices operating in infrastructure to one another and provides access to a distribution system, if connected, which is typically an organization’s enterprise wired network.

  33. access policyUpdated Jan 06, 2026

    A kind of "security policy". (See: access, access control.)

  34. access profileUpdated Jan 06, 2026

    Association of a user with a list of protected objects the user may access.

  35. access program (SAP)Updated Jan 05, 2026

    A program established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally required for information at the same classification level.

  36. access rightUpdated Jan 06, 2026

    Synonym for "authorization"; emphasizes the possession of the authorization by a system entity.

  37. access typeUpdated Jan 05, 2026

    Privilege to perform action on an object. Read, write, execute, append, modify, delete, and create are examples of access types.

  38. Access VectorUpdated Jan 05, 2026

    reflects the access required to exploit the vulnerability.

  39. AccountUpdated Jan 05, 2026

    An entity in a blockchain that is identified with an address and can send transactions to the blockchain.

  40. accountabilityUpdated Jan 06, 2026

    The principle that an individual is entrusted to safeguard and control equipment, keying material, and information and is answerable to proper authority for the loss or misuse of that equipment or information.

  41. Account Access RemovalUpdated Jan 06, 2026

    Adversaries may interrupt availability of system and network resources by inhibiting access to accounts utilized by legitimate users. Accounts may be deleted, locked, or manipulated (ex: credentials changed) to remove access to accounts.

  42. accounting legend codeUpdated Jan 06, 2026

    A numeric code used to indicate the minimum accounting controls required for items of accountable COMSEC material within the COMSEC material control system (CMCS).

  43. accounting numberUpdated Jan 05, 2026

    A number assigned to an individual item of COMSEC material at its point of origin to facilitate its handling and accounting.

  44. account linkingUpdated Jan 05, 2026

    The association of multiple federated identifiers with a single RP subscriber account or the management of those associations.

  45. account recoveryUpdated Jan 05, 2026

    The ability to regain ownership of a subscriber account and its associated information and privileges.

  46. account resolutionUpdated Jan 05, 2026

    The association of an RP subscriber account with information that is already held by the RP prior to the federation transaction and outside of a trust agreement.

  47. AccountsUpdated Jan 06, 2026

    Adversaries may utilize standard operating system APIs to gather account data. On Android, this can be accomplished by using the AccountManager API. For example, adversaries may use the method to list all accounts.(Citation: Android AccountManager Feb2025) On iOS, this can be accomplished by using the Keychain services.

  48. accreditationUpdated Jan 06, 2026

    The official management decision given by a senior agency official to authorize operation of an information system and to explicitly accept the risk to agency operations (including mission, functions, image, or reputation), agency assets, or individuals, based on the implementation of an agreed upon set of security controls.

  49. accreditation boundaryUpdated Jan 06, 2026

    All components of an information system to be accredited by an authorizing official and excludes separately accredited systems, to which the information system is connected. Synonymous with the term security perimeter defined in CNSS Instruction 4009 and DCID 6/3.

  50. accrediting authorityUpdated Jan 05, 2026

    A senior (federal) official or executive with the authority to formally assume responsibility for operating an information system at an acceptable level of risk to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation.