Packet

A routing device that provides access control functionality for host addresses

Packet Filter

A routing device that provides access control functionality for host addresses

Hashing

The process of using a mathematical algorithm against data

Fault Tree Analysis

A top-down, deductive failure analysis in which an undesired state of a system (top event)

Individual

A citizen of the United States or an alien lawfully admitted for permanent residence.

Fault Tolerant

Of a system, having the built-in capability to provide continued, correct execution

Hybrid Cloud

The cloud infrastructure is a composition of two or more distinct cloud infrastructures

Incident

An occurrence that actually or potentially jeopardizes the confidentiality, integrity,

Aggregation

The consolidation of similar log entries into a single entry containing a count

CISO

Official responsible for carrying out the Chief Information Officer responsibilities

DATO

Denial of Authorization to Operate; issued by a DAO to an issuer that is not authorized

DDoS

A Denial of Service technique that uses numerous hosts to perform the attack.

Incident Handling

An IT security incident is an adverse event in a computer system or network

Incident Response

The mitigation of violations of security policies and recommended practices.

Impact Level

The magnitude of harm that can be expected to result from the consequences

Image

A package that contains all the files required to run a container. See NIST SP 800-190.

Byte

A group of eight bits that is treated either as a single entity or as an array of 8 individual

AES

Advanced Encryption Standard (as specified in FIPS 197). NIST SP 800-57 Part 1 Rev. 4

Adversary

Individual, group, organization, or government that conducts or has the intent to conduct

Hot Site

A fully operational offsite data processing facility equipped with hardware and software

Host-based IDPS

A program that monitors the characteristics of a single host and the events occurring